Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-24264 (GCVE-0-2025-24264)
Vulnerability from cvelistv5
- Processing maliciously crafted web content may lead to an unexpected Safari crash
URL | Tags | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2025-24264", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-01T13:17:25.800640Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-01T13:18:17.203Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "18.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iOS and iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "18.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "iPadOS", "vendor": "Apple", "versions": [ { "lessThan": "17.7", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "macOS", "vendor": "Apple", "versions": [ { "lessThan": "15.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "visionOS", "vendor": "Apple", "versions": [ { "lessThan": "2.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "18.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to an unexpected Safari crash", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-31T22:23:36.148Z", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "url": "https://support.apple.com/en-us/122377" }, { "url": "https://support.apple.com/en-us/122371" }, { "url": "https://support.apple.com/en-us/122372" }, { "url": "https://support.apple.com/en-us/122373" }, { "url": "https://support.apple.com/en-us/122378" }, { "url": "https://support.apple.com/en-us/122379" } ] } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2025-24264", "datePublished": "2025-03-31T22:23:36.148Z", "dateReserved": "2025-01-17T00:00:45.016Z", "dateUpdated": "2025-04-01T13:18:17.203Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-24264\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2025-03-31T23:15:23.337\",\"lastModified\":\"2025-04-04T19:00:46.457\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.\"},{\"lang\":\"es\",\"value\":\"El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y Safari 18.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado de Safari.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.4\",\"matchCriteriaId\":\"45D15738-9AE3-4CB5-8755-A67F6E09EAC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"17.7.6\",\"matchCriteriaId\":\"687E67E4-136D-4154-BA6F-5ACA16254023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"18.0\",\"versionEndExcluding\":\"18.4\",\"matchCriteriaId\":\"BAAF5169-C6A9-449A-B41F-2CB1801EBA4B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.4\",\"matchCriteriaId\":\"0D9C73F9-FEF4-4FC1-B83D-56566AD35990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"15.0\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"1320B815-0457-4276-83B9-AFAFDAF17EDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"18.4\",\"matchCriteriaId\":\"8C61CCC2-87D3-4A3A-837B-63C48299A7AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4\",\"matchCriteriaId\":\"E82603D7-A630-4B9B-9C51-880667F05EC7\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/122371\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122372\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122373\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122377\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122378\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/122379\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-24264\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-01T13:17:25.800640Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400 Uncontrolled Resource Consumption\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-01T13:18:08.510Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Apple\", \"product\": \"tvOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.4\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iOS and iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.4\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"iPadOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"17.7\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"macOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"15.4\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"visionOS\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"2.4\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Apple\", \"product\": \"Safari\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"18.4\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://support.apple.com/en-us/122377\"}, {\"url\": \"https://support.apple.com/en-us/122371\"}, {\"url\": \"https://support.apple.com/en-us/122372\"}, {\"url\": \"https://support.apple.com/en-us/122373\"}, {\"url\": \"https://support.apple.com/en-us/122378\"}, {\"url\": \"https://support.apple.com/en-us/122379\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Processing maliciously crafted web content may lead to an unexpected Safari crash\"}]}], \"providerMetadata\": {\"orgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"shortName\": \"apple\", \"dateUpdated\": \"2025-03-31T22:23:36.148Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-24264\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-01T13:18:17.203Z\", \"dateReserved\": \"2025-01-17T00:00:45.016Z\", \"assignerOrgId\": \"286789f9-fbc2-4510-9f9a-43facdede74c\", \"datePublished\": \"2025-03-31T22:23:36.148Z\", \"assignerShortName\": \"apple\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
rhsa-2023:4202
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4202", "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4202.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:23+00:00", "generator": { "date": "2025-10-09T22:25:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:4202", "initial_release_date": "2023-07-18T15:43:59+00:00", "revision_history": [ { "date": "2023-07-18T15:43:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T15:43:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.src", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.src", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.5?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.5?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.5?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.5?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.5?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.5?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el8_8.5?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el8_8.5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.src", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "relates_to_product_reference": "AppStream-8.8.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4202" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.src", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el8_8.5.x86_64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.aarch64", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.i686", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.ppc64le", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.s390x", "AppStream-8.8.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el8_8.5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2025:10364
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkitgtk4 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK+ is port of the WebKit portable web rendering engine to the GTK+ platform. These packages provide WebKitGTK+ for GTK+ 3.\n\nSecurity Fix(es):\n\n* webkitgtk: Command injection in web inspector (CVE-2020-9862)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9893)\n\n* webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution (CVE-2020-9894)\n\n* webkitgtk: Use-after-free may lead to application termination or arbitrary code execution (CVE-2020-9895)\n\n* webkitgtk: Access issue in content security policy (CVE-2020-9915)\n\n* webkitgtk: A logic issue may lead to cross site scripting (CVE-2020-9925)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9802)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9803)\n\n* webkitgtk: Logic issue may lead to cross site scripting (CVE-2020-9805)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9806)\n\n* webkitgtk: Memory corruption may lead to arbitrary code execution (CVE-2020-9807)\n\n* webkitgtk: Input validation issue may lead to cross site scripting (CVE-2020-9843)\n\n* webkitgtk: Logic issue may lead to arbitrary code execution (CVE-2020-9850)\n\n* webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl (CVE-2020-13753)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13584)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2020-9948)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-9951)\n\n* webkitgtk: input validation issue may lead to a cross site scripting (CVE-2020-9952)\n\n* webkitgtk: out-of-bounds write may lead to code execution (CVE-2020-9983)\n\n* webkitgtk: use-after-free may lead to arbitrary code execution (CVE-2020-13543)\n\n* webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution (CVE-2020-13558)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2020-27918)\n\n* webkitgtk: User may be unable to fully delete browsing history (CVE-2020-29623)\n\n* webkitgtk: use after free issue may lead to arbitrary code execution (CVE-2020-9947)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1765)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-1789)\n\n* webkitgtk: Access to restricted ports on arbitrary servers via port redirection (CVE-2021-1799)\n\n* webkitgtk: IFrame sandboxing policy violation (CVE-2021-1801)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1870)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-1788)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-1844)\n\n* webkitgtk: Logic issue leading to arbitrary code execution (CVE-2021-1871)\n\n* webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution (CVE-2021-21806)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-1817)\n\n* webkitgtk: Memory initialization issue possibly leading to memory disclosure (CVE-2021-1820)\n\n* webkitgtk: Input validation issue leading to cross site scripting attack (CVE-2021-1825)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-1826)\n\n* webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution (CVE-2021-21775)\n\n* webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution (CVE-2021-21779)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30661)\n\n* webkitgtk: Integer overflow leading to arbitrary code execution (CVE-2021-30663)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30665)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30666)\n\n* webkitgtk: Logic issue leading to leak of sensitive user information (CVE-2021-30682)\n\n* webkitgtk: Logic issue leading to universal cross site scripting attack (CVE-2021-30689)\n\n* webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers (CVE-2021-30720)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30734)\n\n* webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack (CVE-2021-30744)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30749)\n\n* webkitgtk: Type confusion leading to arbitrary code execution (CVE-2021-30758)\n\n* webkitgtk: Memory corruption leading to arbitrary code execution (CVE-2021-30761)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30762)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30795)\n\n* webkitgtk: Insufficient checks leading to arbitrary code execution (CVE-2021-30797)\n\n* webkitgtk: Memory corruptions leading to arbitrary code execution (CVE-2021-30799)\n\n* webkitgtk: limited sandbox escape via VFS syscalls (CVE-2021-42762)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* chromium-browser: Inappropriate implementation in Navigation (CVE-2022-0108)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer (CVE-2022-30294)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted (CVE-2022-22677)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32893)\n\n* webkitgtk: buffer overflow issue was addressed with improved memory handling (CVE-2022-32886)\n\n* webkitgtk: out-of-bounds read was addressed with improved bounds checking (CVE-2022-32912)\n\n* webkitgtk: UI spoofing while Visiting a website that frames malicious content (CVE-2022-32891)\n\n* webkitgtk: out-of-bounds write issue was addressed with improved bounds checking (CVE-2022-32888)\n\n* webkitgtk: correctness issue in the JIT was addressed with improved checks (CVE-2022-32923)\n\n* webkitgtk: issue was addressed with improved UI handling (CVE-2022-42799)\n\n* webkitgtk: sensitive information disclosure issue (CVE-2022-42824)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2022-42823)\n\n* webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution (CVE-2022-42856)\n\n* webkitgtk: memory disclosure issue was addressed with improved memory handling (CVE-2022-42852)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-42863)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42867)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46691)\n\n* webkitgtk: Same Origin Policy bypass issue (CVE-2022-46692)\n\n* webkitgtk: logic issue leading to user information disclosure (CVE-2022-46698)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46699)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2022-46700)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23518)\n\n* webkitgtk: use-after-free issue leading to arbitrary code execution (CVE-2022-42826)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-23517)\n\n* webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution (CVE-2023-23529)\n\n* webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild() (CVE-2023-25358)\n\n* WebKitGTK: use-after-free leads to arbitrary code execution (CVE-2023-28205)\n\n* webkitgtk: an out-of-bounds read when processing malicious content (CVE-2023-28204)\n\n* webkitgtk: a use-after-free when processing maliciously crafted web content (CVE-2023-32373)\n\n* webkitgtk: improper bounds checking leading to arbitrary code execution (CVE-2022-48503)\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\n* webkitgtk: arbitrary code execution (CVE-2023-37450)\n\n* webkitgtk: arbitrary code execution (CVE-2023-32393)\n\n* webkitgtk: disclose sensitive information (CVE-2023-38133)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-38592)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38594)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38595)\n\n* webkitgtk: track sensitive user information (CVE-2023-38599)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38600)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38611)\n\n* webkitgtk: bypass Same Origin Policy (CVE-2023-38572)\n\n* webkitgtk: arbitrary code execution (CVE-2023-38597)\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: Same Origin Policy bypass via crafted web content (CVE-2023-27932)\n\n* webkitgtk: Website may be able to track sensitive user information (CVE-2023-27954)\n\n* webkitgtk: use after free vulnerability (CVE-2023-28198)\n\n* webkitgtk: content security policy blacklist failure (CVE-2023-32370)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-32792)\n\n* webkitgtk: malicious content may lead to UI spoofing (CVE-2022-32816)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-41993)\n\n* webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports (CVE-2023-39928)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-35074)\n\n* webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code (CVE-2023-40451)\n\n* webkitgtk: processing web content may lead to arbitrary code execution (CVE-2023-41074)\n\n* webkitgtk: Out-of-bounds read leads to sensitive data leak (CVE-2023-42916)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: processing a malicious image may lead to a denial of service (CVE-2023-42883)\n\n* webkitgtk: processing malicious web content may lead to arbitrary code execution (CVE-2023-42890)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-23213)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-40414)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42833)\n\n* webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents (CVE-2014-1745)\n\n* webkit: processing malicious web content may lead to denial-of-service (CVE-2024-23252)\n\n* webkit: malicious website may exfiltrate audio data cross-origin (CVE-2024-23254)\n\n* webkit: processing malicious web content prevents Content Security Policy from being enforced (CVE-2024-23263)\n\n* webkit: maliciously crafted webpage may be able to fingerprint the user (CVE-2024-23280)\n\n* webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced (CVE-2024-23284)\n\n* webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing. (CVE-2022-32919)\n\n* webkitgtk: A website may able to track visited websites in private browsing (CVE-2022-32933)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2022-46705)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing. (CVE-2022-46725)\n\n* webkitgtk: User password may be read aloud by a text-to-speech accessibility feature (CVE-2023-32359)\n\n* webkitgtk: Processing web content may lead to a denial of service (CVE-2023-41983)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* webkit: visiting a malicious website may lead to address bar spoofing (CVE-2023-42843)\n\n* webkit: heap use-after-free may lead to arbitrary code execution (CVE-2023-42950)\n\n* webkit: processing malicious web content may lead to a denial of service (CVE-2023-42956)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkit: pointer authentication bypass (CVE-2024-27834)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Visiting a malicious website may lead to address bar spoofing (CVE-2024-40866)\n\n* webkitgtk: A malicious website may cause unexpected cross-origin behavior (CVE-2024-23271)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2024-27838)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-44187)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2024-44296)\n\n* webkitgtk: data isolation bypass vulnerability (CVE-2024-44309)\n\n* webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-44308)\n\n* WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54479)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54502)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54505)\n\n* webkit: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-54508)\n\n* webkit: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54534)\n\n* webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution (CVE-2024-27856)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2024-54543)\n\n* webkitgtk: A maliciously crafted webpage may be able to fingerprint the user (CVE-2025-24143)\n\n* webkitgtk: Copying a URL from Web Inspector may lead to command injection (CVE-2025-24150)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2025-24158)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24162)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54658)\n\n* webkitgtk: out-of-bounds write vulnerability (CVE-2025-24201)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44192)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2024-54467)\n\n* webkitgtk: Processing web content may lead to a denial-of-service (CVE-2024-54551)\n\n* webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack (CVE-2025-24208)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-24209)\n\n* webkitgtk: A type confusion issue could lead to memory corruption (CVE-2025-24213)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24216)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-24264)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-30427)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42875)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42970)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-24223)\n\n* webkitgtk: Processing maliciously crafted web content may lead to memory corruption (CVE-2025-31204)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2025-31205)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31206)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2025-31215)\n\n* webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash (CVE-2025-31257)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2025:10364", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10364.json" } ], "title": "Red Hat Security Advisory: webkitgtk4 security update", "tracking": { "current_release_date": "2025-10-09T14:47:36+00:00", "generator": { "date": "2025-10-09T14:47:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2025:10364", "initial_release_date": "2025-07-07T02:28:52+00:00", "revision_history": [ { "date": "2025-07-07T02:28:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2025-07-07T02:28:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T14:47:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:7" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=x86_64" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-debuginfo@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-devel@2.48.3-2.el7_9?arch=s390x" } } }, { "category": "product_version", "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_id": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-jsc-devel@2.48.3-2.el7_9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_id": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkitgtk4-doc@2.48.3-2.el7_9?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)", "product_id": "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.src", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch" }, "product_reference": "webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "relates_to_product_reference": "7Server-optional-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)", "product_id": "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" }, "product_reference": "webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "relates_to_product_reference": "7Server-optional-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-1745", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270151" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the SVG implementation within WebKitGTK. This flaw allows remote attackers to exploit the removal of an SVGFontFaceElement object, which occurs through specific vectors that trigger the deletion of the object during rendering.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-1745" }, { "category": "external", "summary": "RHBZ#2270151", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270151" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-1745", "url": "https://www.cve.org/CVERecord?id=CVE-2014-1745" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1745" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a file may lead to a denial of service or potentially disclose memory contents" }, { "cve": "CVE-2020-9802", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879545" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9802" }, { "category": "external", "summary": "RHBZ#1879545", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879545" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9802", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9802" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9802" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9803", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879557" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing maliciously crafted web content leading to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9803" }, { "category": "external", "summary": "RHBZ#1879557", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879557" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9803", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9803" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9805", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879559" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9805" }, { "category": "external", "summary": "RHBZ#1879559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879559" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9805", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9805" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9805" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9806", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879563" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkit gtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. A memory corruption issue could allow processing of maliciously crafted web content that could lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9806" }, { "category": "external", "summary": "RHBZ#1879563", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879563" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9806", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9806" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9807", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879564" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows an attacker to process maliciously crafted web content that may lead to arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9807" }, { "category": "external", "summary": "RHBZ#1879564", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879564" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9807", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9807" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9807" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption may lead to arbitrary code execution" }, { "cve": "CVE-2020-9843", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879566" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 13.5 and iPadOS 13.5, tvOS 13.4.5, watchOS 6.2.5, Safari 13.1.1, iTunes 12.10.7 for Windows, iCloud for Windows 11.2, iCloud for Windows 7.19. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9843" }, { "category": "external", "summary": "RHBZ#1879566", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879566" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9843", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue may lead to cross site scripting" }, { "cve": "CVE-2020-9850", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879568" } ], "notes": [ { "category": "description", "text": "A logic issue was found in webkitgtk that affected WebKitGTK versions before 2.28.3 and WPE WebKit versions before 2.28.3. This flaw allows a remote attacker to cause arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t shipped any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9850" }, { "category": "external", "summary": "RHBZ#1879568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9850", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9850" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9850" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9862", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879532" } ], "notes": [ { "category": "description", "text": "A command injection issue existed in Web Inspector. This issue was addressed with improved escaping. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Copying a URL from Web Inspector may lead to command injection.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Command injection in web inspector", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9862" }, { "category": "external", "summary": "RHBZ#1879532", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879532" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9862", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9862" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9862" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Command injection in web inspector" }, { "cve": "CVE-2020-9893", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879535" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9893" }, { "category": "external", "summary": "RHBZ#1879535", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879535" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9893", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9894", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879536" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in webkitgtk that affected WebKitGTK versions before 2.28.4 and WPE WebKit versions before 2.28.4. This flaw allows a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9894" }, { "category": "external", "summary": "RHBZ#1879536", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879536" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9894", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9894" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9894" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read may lead to unexpected application termination or arbitrary code execution" }, { "cve": "CVE-2020-9895", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.4 and in WPE WebKit in versions prior to 2.28.4. A use-after-free issue was found allowing a remote attacker to cause unexpected application termination or arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9895" }, { "category": "external", "summary": "RHBZ#1879538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9895", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9895" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9895" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free may lead to application termination or arbitrary code execution" }, { "cve": "CVE-2020-9915", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879540" } ], "notes": [ { "category": "description", "text": "An access issue existed in Content Security Policy. This issue was addressed with improved access restrictions. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access issue in content security policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9915" }, { "category": "external", "summary": "RHBZ#1879540", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879540" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9915", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9915" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9915" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access issue in content security policy" }, { "cve": "CVE-2020-9925", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879541" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 13.6 and iPadOS 13.6, tvOS 13.4.8, watchOS 6.2.8, Safari 13.1.2, iTunes 12.10.8 for Windows, iCloud for Windows 11.3, iCloud for Windows 7.20. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A logic issue may lead to cross site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9925" }, { "category": "external", "summary": "RHBZ#1879541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879541" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9925", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9925" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9925" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0007.html", "url": "https://webkitgtk.org/security/WSA-2020-0007.html" } ], "release_date": "2020-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A logic issue may lead to cross site scripting" }, { "cve": "CVE-2020-9947", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944331" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free issue may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9947" }, { "category": "external", "summary": "RHBZ#1944331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9947", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9947" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9947" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free issue may lead to arbitrary code execution" }, { "cve": "CVE-2020-9948", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901214" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9948" }, { "category": "external", "summary": "RHBZ#1901214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9948", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9948" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9948" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2020-9951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901216" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9951" }, { "category": "external", "summary": "RHBZ#1901216", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901216" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9951", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9951" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-9952", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901219" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iOS 14.0 and iPadOS 14.0, tvOS 14.0, watchOS 7.0, Safari 14.0, iCloud for Windows 11.4, iCloud for Windows 7.21. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: input validation issue may lead to a cross site scripting", "title": "Vulnerability summary" }, { "category": "other", "text": "webkit2gtk3 as shipped with Red Hat Enterprise Linux 8 is not affected by this flaw, as the version shipped is newer than the affected version range.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9952" }, { "category": "external", "summary": "RHBZ#1901219", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901219" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9952", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9952" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: input validation issue may lead to a cross site scripting" }, { "cve": "CVE-2020-9983", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901221" } ], "notes": [ { "category": "description", "text": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in Safari 14.0. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write may lead to code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-9983" }, { "category": "external", "summary": "RHBZ#1901221", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901221" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-9983", "url": "https://www.cve.org/CVERecord?id=CVE-2020-9983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-9983" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write may lead to code execution" }, { "cve": "CVE-2020-13543", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-12-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1903568" } ], "notes": [ { "category": "description", "text": "A code execution vulnerability exists in the WebSocket functionality of Webkit WebKitGTK 2.30.0. A specially crafted web page can trigger a use-after-free vulnerability which can lead to remote code execution. An attacker can get a user to visit a webpage to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13543" }, { "category": "external", "summary": "RHBZ#1903568", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1903568" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13543", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13543" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0009.html", "url": "https://webkitgtk.org/security/WSA-2020-0009.html" } ], "release_date": "2020-11-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1928886" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in the AudioSourceProviderGStreamer class of WebKitGTK and WPE WebKit in versions prior to 2.30.5. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13558" }, { "category": "external", "summary": "RHBZ#1928886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1928886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13558", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13558" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0001.html", "url": "https://webkitgtk.org/security/WSA-2021-0001.html" } ], "release_date": "2021-02-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in AudioSourceProviderGStreamer leading to arbitrary code execution" }, { "cve": "CVE-2020-13584", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2020-11-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1901212" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.1 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in a remote code execution. The victim needs to visit a malicious web site to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13584" }, { "category": "external", "summary": "RHBZ#1901212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1901212" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13584", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13584" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13584" } ], "release_date": "2020-11-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2020-13753", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2020-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1879570" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk in versions prior to 2.28.3 and in WPE WebKit in versions prior to 2.28.3. The bubblewrap sandbox failed to properly block access to CLONE_NEWUSER and the TIOCSTI ioctl. CLONE_NEWUSER could potentially be used to confuse xdg- desktop-portal, which allows access outside the sandbox. TIOCSTI can be used to directly execute commands outside the sandbox by writing to the controlling terminal\u2019s input buffer, similar to CVE-2017-5226. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-13753" }, { "category": "external", "summary": "RHBZ#1879570", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879570" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-13753", "url": "https://www.cve.org/CVERecord?id=CVE-2020-13753" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13753" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2020-0006.html", "url": "https://webkitgtk.org/security/WSA-2020-0006.html" } ], "release_date": "2020-07-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Improper access management to CLONE_NEWUSER and the TIOCSTI ioctl" }, { "cve": "CVE-2020-27918", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944323" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-27918" }, { "category": "external", "summary": "RHBZ#1944323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944323" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-27918", "url": "https://www.cve.org/CVERecord?id=CVE-2020-27918" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-27918" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2020-29623", "cwe": { "id": "CWE-459", "name": "Incomplete Cleanup" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944329" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A user may be unable to fully delete the browsing history under some circumstances. The highest threat from this vulnerability is to data confidentiality.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User may be unable to fully delete browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2020-29623" }, { "category": "external", "summary": "RHBZ#1944329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2020-29623", "url": "https://www.cve.org/CVERecord?id=CVE-2020-29623" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623", "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-29623" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: User may be unable to fully delete browsing history" }, { "cve": "CVE-2021-1765", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944333" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1765" }, { "category": "external", "summary": "RHBZ#1944333", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944333" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1765", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1765" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1765" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1788", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944859" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1788" }, { "category": "external", "summary": "RHBZ#1944859", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944859" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1788", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1788" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-1789", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944337" } ], "notes": [ { "category": "description", "text": "A type confusion vulnerability was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1789" }, { "category": "external", "summary": "RHBZ#1944337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944337" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1789", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-05-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1799", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944340" } ], "notes": [ { "category": "description", "text": "A port redirection issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A malicious website may be able to access restricted ports on arbitrary servers. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1799" }, { "category": "external", "summary": "RHBZ#1944340", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944340" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Access to restricted ports on arbitrary servers via port redirection" }, { "cve": "CVE-2021-1801", "cwe": { "id": "CWE-863", "name": "Incorrect Authorization" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944343" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. Maliciously crafted web content may violate the iframe sandboxing policy. The highest threat from this vulnerability is to data integrity.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: IFrame sandboxing policy violation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1801" }, { "category": "external", "summary": "RHBZ#1944343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944343" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1801", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1801" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: IFrame sandboxing policy violation" }, { "cve": "CVE-2021-1817", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986852" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved state management. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1817" }, { "category": "external", "summary": "RHBZ#1986852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986852" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1817", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1817" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1817" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-1820", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986856" } ], "notes": [ { "category": "description", "text": "A memory initialization issue was addressed with improved memory handling. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may result in the disclosure of process memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory initialization issue possibly leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1820" }, { "category": "external", "summary": "RHBZ#1986856", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986856" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1820", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory initialization issue possibly leading to memory disclosure" }, { "cve": "CVE-2021-1825", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986858" } ], "notes": [ { "category": "description", "text": "An input validation issue was addressed with improved input validation. This issue is fixed in iTunes 12.11.3 for Windows, iCloud for Windows 12.3, macOS Big Sur 11.3, Safari 14.1, watchOS 7.4, tvOS 14.5, iOS 14.5 and iPadOS 14.5. Processing maliciously crafted web content may lead to a cross site scripting attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Input validation issue leading to cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1825" }, { "category": "external", "summary": "RHBZ#1986858", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986858" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1825", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1825" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1825" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Input validation issue leading to cross site scripting attack" }, { "cve": "CVE-2021-1826", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986860" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in macOS Big Sur 11.3, iOS 14.5 and iPadOS 14.5, watchOS 7.4, tvOS 14.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1826" }, { "category": "external", "summary": "RHBZ#1986860", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986860" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1826", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-1844", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944862" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. Processing maliciously crafted web content may lead to arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1844" }, { "category": "external", "summary": "RHBZ#1944862", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944862" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1844", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1844" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1870", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944350" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.30.6. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1870" }, { "category": "external", "summary": "RHBZ#1944350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1870", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1870" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1870" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0002.html", "url": "https://webkitgtk.org/security/WSA-2021-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-1871", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-03-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1944867" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit in versions prior to 2.32.0. A remote attacker may be able to cause arbitrary code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-1871" }, { "category": "external", "summary": "RHBZ#1944867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1944867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-1871", "url": "https://www.cve.org/CVERecord?id=CVE-2021-1871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1871" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0003.html", "url": "https://webkitgtk.org/security/WSA-2021-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-03-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to arbitrary code execution" }, { "cve": "CVE-2021-21775", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986863" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21775" }, { "category": "external", "summary": "RHBZ#1986863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21775", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21775" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21775" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in ImageLoader dispatchPendingErrorEvent leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21779", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986866" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability exists in the way Webkit\u2019s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21779" }, { "category": "external", "summary": "RHBZ#1986866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986866" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21779", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in WebCore::GraphicsContext leading to information leak and possibly code execution" }, { "cve": "CVE-2021-21806", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-07-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1980441" } ], "notes": [ { "category": "description", "text": "An exploitable use-after-free vulnerability exists in WebKitGTK browser version 2.30.3 x64. A specially crafted HTML web page can cause a use-after-free condition, resulting in remote code execution. The victim needs to visit a malicious web site to trigger the vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-21806" }, { "category": "external", "summary": "RHBZ#1980441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1980441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-21806", "url": "https://www.cve.org/CVERecord?id=CVE-2021-21806" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-21806" }, { "category": "external", "summary": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2020-1214" } ], "release_date": "2021-07-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free in fireEventListeners leading to arbitrary code execution" }, { "cve": "CVE-2021-30661", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986870" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30661" }, { "category": "external", "summary": "RHBZ#1986870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986870" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30661", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30661" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30661" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30663", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986872" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by an integer overflow in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Integer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30663" }, { "category": "external", "summary": "RHBZ#1986872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30663", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30663" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30663" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Integer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30665", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986874" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a memory corruption issue in the WebKit component. An attacker can execute arbitrary code on the system by persuading a victim to visit a specially crafted Web site.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30665" }, { "category": "external", "summary": "RHBZ#1986874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986874" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30665", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30665" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30665" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30666", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986877" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package are vulnerable to a buffer overflow caused by improper bounds checking by the WebKit component. By persuading a victim to visit a specially crafted Web site, a remote attacker could overflow a buffer and execute arbitrary code on the system or cause the application to crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30666" }, { "category": "external", "summary": "RHBZ#1986877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30666", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30666" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30666" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30682", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986879" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious application may be able to leak sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to leak of sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30682" }, { "category": "external", "summary": "RHBZ#1986879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30682", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30682" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30682" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to leak of sensitive user information" }, { "cve": "CVE-2021-30689", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986881" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved state management. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30689" }, { "category": "external", "summary": "RHBZ#1986881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30689", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30689" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30689" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30720", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986883" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved restrictions. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. A malicious website may be able to access restricted ports on arbitrary servers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30720" }, { "category": "external", "summary": "RHBZ#1986883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986883" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30720", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30720" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30720" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.3, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue allowing access to restricted ports on arbitrary servers" }, { "cve": "CVE-2021-30734", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986886" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30734" }, { "category": "external", "summary": "RHBZ#1986886", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986886" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30734", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30734" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30734" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30744", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986888" } ], "notes": [ { "category": "description", "text": "Description: A cross-origin issue with iframe elements was addressed with improved tracking of security origins. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to universal cross site scripting.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30744" }, { "category": "external", "summary": "RHBZ#1986888", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986888" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30744", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30744" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30744" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin issue with iframe elements leading to universal cross site scripting attack" }, { "cve": "CVE-2021-30749", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986890" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in tvOS 14.6, iOS 14.6 and iPadOS 14.6, Safari 14.1.1, macOS Big Sur 11.4, watchOS 7.5. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30749" }, { "category": "external", "summary": "RHBZ#1986890", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986890" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30749", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30749" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30749" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30758", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986892" } ], "notes": [ { "category": "description", "text": "A type confusion issue was addressed with improved state handling. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30758" }, { "category": "external", "summary": "RHBZ#1986892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30758", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30758" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30758" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion leading to arbitrary code execution" }, { "cve": "CVE-2021-30761", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986894" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by memory corruption in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker could exploit this vulnerability to execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30761" }, { "category": "external", "summary": "RHBZ#1986894", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986894" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30761", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30761" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption leading to arbitrary code execution" }, { "cve": "CVE-2021-30762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986898" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. Affected versions of this package could allow a remote attacker to execute arbitrary code on the system caused by a use-after-free in the WebKit component. By persuading a victim to visit a specially crafted Web site, an attacker can execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30762" }, { "category": "external", "summary": "RHBZ#1986898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30762" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2021-11-03T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30795", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986900" } ], "notes": [ { "category": "description", "text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30795" }, { "category": "external", "summary": "RHBZ#1986900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986900" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30795", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30795" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30795" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30797", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986902" } ], "notes": [ { "category": "description", "text": "This issue was addressed with improved checks. This issue is fixed in iOS 14.7, Safari 14.1.2, macOS Big Sur 11.5, watchOS 7.6, tvOS 14.7. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Insufficient checks leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30797" }, { "category": "external", "summary": "RHBZ#1986902", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986902" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30797", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30797" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30797" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Insufficient checks leading to arbitrary code execution" }, { "cve": "CVE-2021-30799", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-07-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1986906" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.7, macOS Big Sur 11.5, Security Update 2021-004 Catalina, Security Update 2021-005 Mojave. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruptions leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30799" }, { "category": "external", "summary": "RHBZ#1986906", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1986906" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30799", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0004.html", "url": "https://webkitgtk.org/security/WSA-2021-0004.html" } ], "release_date": "2021-07-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruptions leading to arbitrary code execution" }, { "cve": "CVE-2021-30809", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034347" } ], "notes": [ { "category": "description", "text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30809" }, { "category": "external", "summary": "RHBZ#2034347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30809" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2021-30818", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034368" } ], "notes": [ { "category": "description", "text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30818" }, { "category": "external", "summary": "RHBZ#2034368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30818" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30823", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034373" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to HSTS bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30823" }, { "category": "external", "summary": "RHBZ#2034373", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to HSTS bypass" }, { "cve": "CVE-2021-30836", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034376" } ], "notes": [ { "category": "description", "text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leading to memory disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30836" }, { "category": "external", "summary": "RHBZ#2034376", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30836" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: Out-of-bounds read leading to memory disclosure" }, { "cve": "CVE-2021-30846", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017898" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30846" }, { "category": "external", "summary": "RHBZ#2017898", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30846" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30848", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017901" } ], "notes": [ { "category": "description", "text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30848" }, { "category": "external", "summary": "RHBZ#2017901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30848" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30849", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2017904" } ], "notes": [ { "category": "description", "text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30849" }, { "category": "external", "summary": "RHBZ#2017904", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30849" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30851", "discovery_date": "2021-10-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2018573" } ], "notes": [ { "category": "description", "text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30851" }, { "category": "external", "summary": "RHBZ#2018573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2021-0006.html", "url": "https://webkitgtk.org/security/WSA-2021-0006.html" } ], "release_date": "2021-10-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2021-30884", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034378" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30884" }, { "category": "external", "summary": "RHBZ#2034378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30884" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history" }, { "cve": "CVE-2021-30887", "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034381" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to Content Security Policy bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30887" }, { "category": "external", "summary": "RHBZ#2034381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30887" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to Content Security Policy bypass" }, { "cve": "CVE-2021-30888", "cwe": { "id": "CWE-601", "name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034383" } ], "notes": [ { "category": "description", "text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Information leak via Content Security Policy reports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30888" }, { "category": "external", "summary": "RHBZ#2034383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Information leak via Content Security Policy reports" }, { "cve": "CVE-2021-30889", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034386" } ], "notes": [ { "category": "description", "text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30889" }, { "category": "external", "summary": "RHBZ#2034386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30889" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2021-30890", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2034389" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Logic issue leading to universal cross-site scripting", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30890" }, { "category": "external", "summary": "RHBZ#2034389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Logic issue leading to universal cross-site scripting" }, { "cve": "CVE-2021-30897", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2021-12-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2038907" } ], "notes": [ { "category": "description", "text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cross-origin data exfiltration via resource timing API", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30897" }, { "category": "external", "summary": "RHBZ#2038907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30897" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897" } ], "release_date": "2021-12-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cross-origin data exfiltration via resource timing API" }, { "cve": "CVE-2021-30934", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044521" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30934" }, { "category": "external", "summary": "RHBZ#2044521", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30934" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30936", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044528" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30936" }, { "category": "external", "summary": "RHBZ#2044528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30936" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30951", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044534" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30951" }, { "category": "external", "summary": "RHBZ#2044534", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30951" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30952", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044538" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30952" }, { "category": "external", "summary": "RHBZ#2044538", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30952" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30953", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044542" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30953" }, { "category": "external", "summary": "RHBZ#2044542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30953" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30954", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044551" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30954" }, { "category": "external", "summary": "RHBZ#2044551", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-30984", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2044553" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-30984" }, { "category": "external", "summary": "RHBZ#2044553", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984", "url": "https://www.cve.org/CVERecord?id=CVE-2021-30984" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2021-42762", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2021-10-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2016673" } ], "notes": [ { "category": "description", "text": "BubblewrapLauncher.cpp in WebKitGTK and WPE WebKit before 2.34.1 allows a limited sandbox bypass that allows a sandboxed process to trick host processes into thinking the sandboxed process is not confined by the sandbox, by abusing VFS syscalls that manipulate its filesystem namespace. The impact is limited to host services that create UNIX sockets that WebKit mounts inside its sandbox, and the sandboxed process remains otherwise confined. NOTE: this is similar to CVE-2021-41133.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: limited sandbox escape via VFS syscalls", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-42762" }, { "category": "external", "summary": "RHBZ#2016673", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2016673" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-42762", "url": "https://www.cve.org/CVERecord?id=CVE-2021-42762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-42762" } ], "release_date": "2021-10-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: limited sandbox escape via VFS syscalls" }, { "cve": "CVE-2021-45481", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040327" } ], "notes": [ { "category": "description", "text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45481" }, { "category": "external", "summary": "RHBZ#2040327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45481" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create" }, { "cve": "CVE-2021-45482", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040329" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45482" }, { "category": "external", "summary": "RHBZ#2040329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild" }, { "cve": "CVE-2021-45483", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2021-12-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2040331" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in WebCore::Frame::page", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2021-45483" }, { "category": "external", "summary": "RHBZ#2040331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483", "url": "https://www.cve.org/CVERecord?id=CVE-2021-45483" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483", "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483" } ], "release_date": "2021-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in WebCore::Frame::page" }, { "cve": "CVE-2022-0108", "discovery_date": "2022-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2037469" } ], "notes": [ { "category": "description", "text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Inappropriate implementation in Navigation", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-0108" }, { "category": "external", "summary": "RHBZ#2037469", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2037469" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-0108", "url": "https://www.cve.org/CVERecord?id=CVE-2022-0108" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-0108" } ], "release_date": "2022-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "chromium-browser: Inappropriate implementation in Navigation" }, { "cve": "CVE-2022-22589", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053179" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22589" }, { "category": "external", "summary": "RHBZ#2053179", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22589" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript" }, { "cve": "CVE-2022-22590", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053181" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22590" }, { "category": "external", "summary": "RHBZ#2053181", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22590" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-22592", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-02-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2053185" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22592" }, { "category": "external", "summary": "RHBZ#2053185", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0002.html", "url": "https://webkitgtk.org/security/WSA-2022-0002.html" } ], "release_date": "2022-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2022-22594", "cwe": { "id": "CWE-346", "name": "Origin Validation Error" }, "discovery_date": "2022-01-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2045291" } ], "notes": [ { "category": "description", "text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22594" }, { "category": "external", "summary": "RHBZ#2045291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0001.html", "url": "https://webkitgtk.org/security/WSA-2022-0001.html" } ], "release_date": "2022-01-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2022-22620", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-02-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2056474" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22620" }, { "category": "external", "summary": "RHBZ#2056474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0003.html", "url": "https://webkitgtk.org/security/WSA-2022-0003.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-02-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-02-11T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free" }, { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22637", "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073903" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue was addressed with improved state management", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22637" }, { "category": "external", "summary": "RHBZ#2073903", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22637" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue was addressed with improved state management" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-22677", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104788" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs due to a logic issue in video self-preview feature in a webRTC call, which can be interrupted if the user answers a phone call or the audio capture is interrupted. This flaw allows a remote attacker to perform a denial of service attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted", "title": "Vulnerability summary" }, { "category": "other", "text": "The vulnerability does not affect RHEL because WebRTC code is not included in any WebKitGTK releases thus far.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22677" }, { "category": "external", "summary": "RHBZ#2104788", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104788" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22677", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22677" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22677" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "webkitgtk: the video in a webRTC call may be interrupted if the audio capture gets interrupted" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-30294", "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082544" } ], "notes": [ { "category": "description", "text": "[REJECTED CVE] In WebKitGTK through 2.36.0 (and WPE WebKit), there is a use-after-free in WebCore::TextureMapperLayer::setContentsLayer in WebCore/platform/graphics/texmap/TextureMapperLayer.cpp.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw was found to be a duplicate of CVE-2022-30293. Please see https://access.redhat.com/security/cve/CVE-2022-30293 for information about affected products and security errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30294" }, { "category": "external", "summary": "RHBZ#2082544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30294", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30294" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30294" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 0.0, "baseSeverity": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "title": "webkitgtk: heap-buffer-overflow in WebCore::TextureMapperLayer::setContentsLayer" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2022-32886", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128643" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtkm, where a buffer overflow issue was addressed with improved memory handling. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: buffer overflow issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32886" }, { "category": "external", "summary": "RHBZ#2128643", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128643" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32886", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32886" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: buffer overflow issue was addressed with improved memory handling" }, { "cve": "CVE-2022-32888", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140501" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32888" }, { "category": "external", "summary": "RHBZ#2140501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32888", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32888" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32888" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds write issue was addressed with improved bounds checking" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" }, { "cve": "CVE-2022-32893", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-08-26T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2121645" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to an out-of-bounds write. This flaw allows an attacker with network access to pass specially crafted web content files, causing arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Since Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32893" }, { "category": "external", "summary": "RHBZ#2121645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2121645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32893", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32893" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32893" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0008.html", "url": "https://webkitgtk.org/security/WSA-2022-0008.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-08-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-08-18T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32912", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128645" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an out-of-bounds read was addressed with improved bounds checking. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32912" }, { "category": "external", "summary": "RHBZ#2128645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128645" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32912", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32912" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32912" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2022-32919", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271437" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK and WPE WebKit that allows a remote attacker to conduct spoofing attacks by exploiting improper UI handling. This flaw enables attackers to create specially crafted websites that can display misleading information to users. By exploiting this vulnerability, an attacker can trick users into believing they are interacting with a legitimate website, potentially leading to a UI spoofing attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32919" }, { "category": "external", "summary": "RHBZ#2271437", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271437" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32919", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32919" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32919" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a website that frames malicious content may lead to UI spoofing." }, { "cve": "CVE-2022-32923", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140502" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. Processing maliciously crafted web content may disclose the internal states of the app.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: correctness issue in the JIT was addressed with improved checks", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32923" }, { "category": "external", "summary": "RHBZ#2140502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32923", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32923" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32923" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: correctness issue in the JIT was addressed with improved checks" }, { "cve": "CVE-2022-32933", "cwe": { "id": "CWE-841", "name": "Improper Enforcement of Behavioral Workflow" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271441" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a website may be able to track the websites a user visited in private browsing mode.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A website may able to track visited websites in private browsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32933" }, { "category": "external", "summary": "RHBZ#2271441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32933", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32933" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32933" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A website may able to track visited websites in private browsing" }, { "cve": "CVE-2022-42799", "cwe": { "id": "CWE-1021", "name": "Improper Restriction of Rendered UI Layers or Frames" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140503" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: issue was addressed with improved UI handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42799" }, { "category": "external", "summary": "RHBZ#2140503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42799", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42799" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42799" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: issue was addressed with improved UI handling" }, { "cve": "CVE-2022-42823", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140505" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a logic issue was addressed with improved state management. Processing maliciously crafted web content may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42823" }, { "category": "external", "summary": "RHBZ#2140505", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140505" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42823", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42823" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42823" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42824", "discovery_date": "2022-11-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2140504" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: sensitive information disclosure issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42824" }, { "category": "external", "summary": "RHBZ#2140504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2140504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42824", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42824" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42824" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0010.html", "url": "https://webkitgtk.org/security/WSA-2022-0010.html" } ], "release_date": "2022-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: sensitive information disclosure issue" }, { "cve": "CVE-2022-42826", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167716" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue exists due to a use-after-free error when processing maliciously crafted web content in WebKit. This may allow an attacker to trick the victim to visit a specially crafted website, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42826" }, { "category": "external", "summary": "RHBZ#2167716", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167716" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42826", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42826" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42826" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42852", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156986" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory disclosure issue was addressed with improved memory handling", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42852" }, { "category": "external", "summary": "RHBZ#2156986", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156986" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory disclosure issue was addressed with improved memory handling" }, { "cve": "CVE-2022-42856", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2022-12-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2153683" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where a type confusion issue was addressed with improved memory handling. By this security flaw processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42856" }, { "category": "external", "summary": "RHBZ#2153683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2153683" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42856", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42856" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2022-12-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useFTLJIT=0 will disable the vulnerable code. (This will also somewhat slow down JavaScript execution.)", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2022-12-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may lead to an arbitrary code execution" }, { "cve": "CVE-2022-42863", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156987" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42863" }, { "category": "external", "summary": "RHBZ#2156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156987" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42863", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42863" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42863" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-42867", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156989" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-42867" }, { "category": "external", "summary": "RHBZ#2156989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156989" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-42867", "url": "https://www.cve.org/CVERecord?id=CVE-2022-42867" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-42867" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46691", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156990" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46691" }, { "category": "external", "summary": "RHBZ#2156990", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156990" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46691", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46691" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46691" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46692", "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156991" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass issue", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46692" }, { "category": "external", "summary": "RHBZ#2156991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156991" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46692", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46692" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46692" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass issue" }, { "cve": "CVE-2022-46698", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156992" } ], "notes": [ { "category": "description", "text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows an attacker to process maliciously crafted web content that may disclose sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: logic issue leading to user information disclosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46698" }, { "category": "external", "summary": "RHBZ#2156992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156992" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46698", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46698" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: logic issue leading to user information disclosure" }, { "cve": "CVE-2022-46699", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156993" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46699" }, { "category": "external", "summary": "RHBZ#2156993", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156993" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46699", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46699" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46699" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46700", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-12-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2156994" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Improper input validation leads to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or perform arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46700" }, { "category": "external", "summary": "RHBZ#2156994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2156994" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0011.html", "url": "https://webkitgtk.org/security/WSA-2022-0011.html" } ], "release_date": "2022-12-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-46705", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271444" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to bypass security restrictions and spoof the user\u0027s address bar. This issue occurs when a victim is persuaded to access a specially crafted website due to improper handling of URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46705" }, { "category": "external", "summary": "RHBZ#2271444", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271444" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46705", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46705" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2022-46725", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271446" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw occurs due to an issue in the component URL Handler, which allows a remote attacker to manipulate an unknown input that can lead to clickjacking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-46725" }, { "category": "external", "summary": "RHBZ#2271446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271446" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-46725", "url": "https://www.cve.org/CVERecord?id=CVE-2022-46725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-46725" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing." }, { "cve": "CVE-2022-48503", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218623" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: improper bounds checking leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-48503" }, { "category": "external", "summary": "RHBZ#2218623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-48503", "url": "https://www.cve.org/CVERecord?id=CVE-2022-48503" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-48503" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: improper bounds checking leading to arbitrary code execution" }, { "cve": "CVE-2023-23517", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167717" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23517" }, { "category": "external", "summary": "RHBZ#2167717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23517", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23517" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23518", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2167715" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. A remote attacker can create a specially crafted web page, trick the victim into opening it, trigger memory corruption, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23518" }, { "category": "external", "summary": "RHBZ#2167715", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2167715" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23518", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23518" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23518" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0001.html", "url": "https://webkitgtk.org/security/WSA-2023-0001.html" } ], "release_date": "2023-02-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-23529", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-02-15T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2169934" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This issue occurs when processing maliciously crafted web content in WebKit. This may, in theory, allow a remote attacker to create a specially crafted web page, trick the victim into opening it, trigger type confusion, and execute arbitrary code on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-23529" }, { "category": "external", "summary": "RHBZ#2169934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2169934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-23529", "url": "https://www.cve.org/CVERecord?id=CVE-2023-23529" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-23529" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0002.html", "url": "https://webkitgtk.org/security/WSA-2023-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-02-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Setting the environment variable JSC_useDFGJIT=0 will mitigate this issue.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-02-14T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: processing maliciously crafted web content may be exploited for arbitrary code execution" }, { "cve": "CVE-2023-25358", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-03-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2175099" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability in WebCore::RenderLayer::addChild in WebKitGTK before 2.36.8 allows attackers to execute code remotely.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-25358" }, { "category": "external", "summary": "RHBZ#2175099", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2175099" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-25358", "url": "https://www.cve.org/CVERecord?id=CVE-2023-25358" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25358" }, { "category": "external", "summary": "https://bugs.webkit.org/show_bug.cgi?id=242683", "url": "https://bugs.webkit.org/show_bug.cgi?id=242683" } ], "release_date": "2022-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: heap-use-after-free in WebCore::RenderLayer::addChild()" }, { "cve": "CVE-2023-27932", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Security Policy with Untrusted Domains" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may bypass the same-origin Policy.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Same Origin Policy bypass via crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27932" }, { "category": "external", "summary": "RHBZ#2236843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27932", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27932" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27932" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Same Origin Policy bypass via crafted web content" }, { "cve": "CVE-2023-27954", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236844" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue leads to tracking sensitive user information via a website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Website may be able to track sensitive user information", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-27954" }, { "category": "external", "summary": "RHBZ#2236844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-27954", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27954" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-27954" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Website may be able to track sensitive user information" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-28204", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209208" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An out of bounds read may be possible when processing malicious web content, which can lead to information disclosure.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: an out-of-bounds read when processing malicious content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28204" }, { "category": "external", "summary": "RHBZ#2209208", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209208" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28204", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28204" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: an out-of-bounds read when processing malicious content" }, { "cve": "CVE-2023-28205", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2185724" } ], "notes": [ { "category": "description", "text": "A flaw was found in the webkitgtk package. An improper input validation issue may lead to a use-after-free vulnerability. This vulnerability allows attackers with network access to pass specially crafted web content files, causing Denial of Service or Arbitrary Code Execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: use-after-free leads to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28205" }, { "category": "external", "summary": "RHBZ#2185724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2185724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28205", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28205" }, { "category": "external", "summary": "https://github.com/advisories/GHSA-6qjh-p74q-89mv", "url": "https://github.com/advisories/GHSA-6qjh-p74q-89mv" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-04-10T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: use-after-free leads to arbitrary code execution" }, { "cve": "CVE-2023-32359", "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271449" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk where a user\u2019s password may be read aloud by a text-to-speech accessibility feature.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32359" }, { "category": "external", "summary": "RHBZ#2271449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32359", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32359" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32359" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: User password may be read aloud by a text-to-speech accessibility feature" }, { "cve": "CVE-2023-32370", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238944" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. A logic issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: content security policy blacklist failure", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32370" }, { "category": "external", "summary": "RHBZ#2238944", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238944" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32370", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32370" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32370" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: content security policy blacklist failure" }, { "cve": "CVE-2023-32373", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2209214" } ], "notes": [ { "category": "description", "text": "A use after free vulnerability was found in the webkitgtk package. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: a use-after-free when processing maliciously crafted web content", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is not aware of any exploitation of this flaw in Linux platforms at this time.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32373" }, { "category": "external", "summary": "RHBZ#2209214", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2209214" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32373", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32373" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32373" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-05-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-22T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: a use-after-free when processing maliciously crafted web content" }, { "cve": "CVE-2023-32393", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-07-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2224608" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32393" }, { "category": "external", "summary": "RHBZ#2224608", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2224608" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32393", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32393" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32393" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0006.html", "url": "https://webkitgtk.org/security/WSA-2023-0006.html" } ], "release_date": "2023-07-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38133", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231015" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to excessive data output in WebKit Process Model. This issue occurs when processing malicious web content, which may lead to sensitive information disclosure to unauthorized attackers.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: disclose sensitive information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38133" }, { "category": "external", "summary": "RHBZ#2231015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231015" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38133", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38133" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38133" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: disclose sensitive information" }, { "cve": "CVE-2023-38572", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Security Policy with Untrusted Domains" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231028" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This flaw exists due to an error when handling the Same Origin Policy. A remote attacker can bypass Same Origin Policy restrictions.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: bypass Same Origin Policy", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38572" }, { "category": "external", "summary": "RHBZ#2231028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231028" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38572", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38572" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38572" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: bypass Same Origin Policy" }, { "cve": "CVE-2023-38592", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231017" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38592" }, { "category": "external", "summary": "RHBZ#2231017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231017" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38592", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38592" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38592" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38597", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231043" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38597" }, { "category": "external", "summary": "RHBZ#2231043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231043" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38597", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38597" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38597" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38599", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231020" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK, which exists due to a logic issue in WebKit related to a user\u0027s privacy. A remote attacker may be able to track sensitive user information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: track sensitive user information", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38599" }, { "category": "external", "summary": "RHBZ#2231020", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231020" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38599", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38599" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38599" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: track sensitive user information" }, { "cve": "CVE-2023-38600", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231021" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38600" }, { "category": "external", "summary": "RHBZ#2231021", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231021" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38600", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38600" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38600" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38611", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231022" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38611" }, { "category": "external", "summary": "RHBZ#2231022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38611", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38611" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38611" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-39928", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241400" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in the WebKitGTK\u0027s MediaRecorder API that may lead to memory corruption and Remote Code Execution. The victim needs to access a malicious web page to trigger this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-39928" }, { "category": "external", "summary": "RHBZ#2241400", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241400" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-39928", "url": "https://www.cve.org/CVERecord?id=CVE-2023-39928" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-39928" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use-after-free in the MediaRecorder API of the WebKit GStreamer-based ports" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-40414", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270143" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit could allow an attacker to execute arbitrary code on a target system. The issue arises from a use-after-free flaw in memory management when processing web content. This flaw can potentially give attackers the ability to take control of affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40414" }, { "category": "external", "summary": "RHBZ#2270143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270143" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40414", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40414" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40414" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-40451", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241409" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. An attacker may be able to execute JavaScript code to trigger Remote Code Execution, resulting in a high impact on data confidentiality, integrity, and system availability.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40451" }, { "category": "external", "summary": "RHBZ#2241409", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241409" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40451", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40451" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40451" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0009.html", "url": "https://webkitgtk.org/security/WSA-2023-0009.html" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: attacker with JavaScript execution may be able to execute arbitrary code" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41983", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271453" } ], "notes": [ { "category": "description", "text": "A vulnerability in WebKitGTK and WPE WebKit may result in a denial-of-service when processing web content. This issue arises from improper memory handling, which could be exploited by attackers to crash the affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41983" }, { "category": "external", "summary": "RHBZ#2271453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271453" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41983", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41983" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41983" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial of service" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42833", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270146" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42833" }, { "category": "external", "summary": "RHBZ#2270146", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270146" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42833", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42843", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271717" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit that may allow a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. By tricking a victim into visiting a specially crafted website, the attacker could perform address bar spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42843" }, { "category": "external", "summary": "RHBZ#2271717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271717" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42843", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42843" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42843" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42883", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254326" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing a malicious image, which could result in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing a malicious image may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42883" }, { "category": "external", "summary": "RHBZ#2254326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254326" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42883", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42883" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42883" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing a malicious image may lead to a denial of service" }, { "cve": "CVE-2023-42890", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-12-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2254327" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue exists due to a boundary error when processing malicious HTML content in WebKit, which could result in memory corruption and arbitrary code execution on the target system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "While the discovered flaw in WebKitGTK does indeed present a concerning potential for arbitrary code execution due to memory corruption, its severity is assessed as moderate rather than critical for several reasons. Firstly, successful exploitation of the vulnerability requires the user to interact with malicious HTML content, typically through visiting a compromised website. This dependency on user interaction reduces the likelihood of widespread exploitation compared to vulnerabilities that can be remotely exploited without user interaction. Additionally, the impact of the flaw may be mitigated by various security measures such as sandboxing or Content Security Policy (CSP) enforcement, which can limit the execution environment for potentially malicious code.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42890" }, { "category": "external", "summary": "RHBZ#2254327", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2254327" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42890", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42890" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42890" } ], "release_date": "2023-12-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42950", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271718" } ], "notes": [ { "category": "description", "text": "A heap use-after-free vulnerability was found in WebKit. Exploiting this flaw involves processing maliciously crafted web content, which may result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: heap use-after-free may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42950" }, { "category": "external", "summary": "RHBZ#2271718", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271718" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42950", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42950" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42950" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: heap use-after-free may lead to arbitrary code execution" }, { "cve": "CVE-2023-42956", "discovery_date": "2024-03-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271719" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This issue may allow an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to a denial of service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42956" }, { "category": "external", "summary": "RHBZ#2271719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42956", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42956" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42956" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0002.html", "url": "https://webkitgtk.org/security/WSA-2024-0002.html" } ], "release_date": "2024-03-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to a denial of service" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23213", "discovery_date": "2024-03-18T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270141" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK\u00a0. This flaw allows a remote attacker to trigger arbitrary code execution by persuading a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated Imporatant because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23213" }, { "category": "external", "summary": "RHBZ#2270141", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270141" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23213", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" } ], "release_date": "2024-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-23254", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270289" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit, where a remote attacker is able to exfiltrate audio data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: malicious website may exfiltrate audio data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23254" }, { "category": "external", "summary": "RHBZ#2270289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23254", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23254" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23254" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: malicious website may exfiltrate audio data cross-origin" }, { "cve": "CVE-2024-23263", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270290" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic issue by convincing a victim to visit a specially crafted website. This results in the attacker evading the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23263" }, { "category": "external", "summary": "RHBZ#2270290", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270290" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23263", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23263" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23263" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-23271", "cwe": { "id": "CWE-942", "name": "Permissive Cross-domain Security Policy with Untrusted Domains" }, "discovery_date": "2024-09-25T15:33:21.499000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314696" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to trigger unexpected cross-origin behavior via a malicious website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may cause unexpected cross-origin behavior", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23271" }, { "category": "external", "summary": "RHBZ#2314696", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314696" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23271", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23271" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23271" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may cause unexpected cross-origin behavior" }, { "cve": "CVE-2024-23280", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270291" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions through an injection issue by persuading a victim to access a specially crafted website, enabling the attackers to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23280" }, { "category": "external", "summary": "RHBZ#2270291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23280", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23280" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23280" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-23284", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270292" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows remote attackers to bypass security restrictions due to a logic flaw by persuading a victim to access a specially crafted website, enabling attackers to circumvent the Content Security Policy enforcement.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23284" }, { "category": "external", "summary": "RHBZ#2270292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270292" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23284", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23284" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23284" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing maliciously crafted web content prevents Content Security Policy from being enforced" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-27838", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2024-09-25T15:42:35.706000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314702" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This vulnerability allows a maliciously crafted webpage to fingerprint the user.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27838" }, { "category": "external", "summary": "RHBZ#2314702", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314702" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27838", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27838" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27838" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-40866", "discovery_date": "2024-09-17T00:31:06.549134+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2312724" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows a remote attacker to conduct spoofing attacks by exploiting an inconsistent user interface issue. The attacker could perform address bar spoofing by tricking a victim into visiting a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Visiting a malicious website may lead to address bar spoofing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40866" }, { "category": "external", "summary": "RHBZ#2312724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2312724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40866", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40866" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40866" }, { "category": "external", "summary": "https://support.apple.com/en-us/121238", "url": "https://support.apple.com/en-us/121238" }, { "category": "external", "summary": "https://support.apple.com/en-us/121241", "url": "https://support.apple.com/en-us/121241" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-17T00:15:49.840000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Visiting a malicious website may lead to address bar spoofing" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44187", "discovery_date": "2024-09-25T15:50:57.927000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314706" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to exfiltrate data cross-origin by convincing a victim to visit a specially crafted website, which results in obtaining sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44187" }, { "category": "external", "summary": "RHBZ#2314706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314706" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44187", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44187" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44187" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-44192", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2025-03-20T12:50:04.459000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353871" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44192" }, { "category": "external", "summary": "RHBZ#2353871", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353871" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44192", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44192" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44192" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44296", "cwe": { "id": "CWE-358", "name": "Improperly Implemented Security Check for Standard" }, "discovery_date": "2024-11-01T21:16:26.289000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323289" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing maliciously crafted web content may prevent the Content Security Policy from being enforced. This issue leads to items that were banned from running to be executed.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44296" }, { "category": "external", "summary": "RHBZ#2323289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323289" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44296", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44296" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44296" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced" }, { "cve": "CVE-2024-44308", "discovery_date": "2024-11-21T23:02:37.337000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327931" } ], "notes": [ { "category": "description", "text": "A vulnerability was discovered in WebKitGTK\u0027s JIT compiler. Processing maliciously crafted web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "In order to exploit this vulnerability, the WebKitGTK JIT engine must be enabled and an attacker needs to trick a user into processing or loading malicious web content. This feature is disabled in Red Hat Enterprise Linux versions 8 and 9, meaning these releases are not affected by this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44308" }, { "category": "external", "summary": "RHBZ#2327931", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327931" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44308", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44308" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44308" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nAffected installations of Red Hat Enterprise Linux 7 can disable the JIT engine by setting the JavaScriptCoreUseJIT environment variable to 0.\n\nAdditionally, in Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: javascriptcore: processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-44309", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2024-11-21T22:51:08.987000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2327927" } ], "notes": [ { "category": "description", "text": "A data isolation bypass vulnerability was discovered in WebKitGTK. Processing maliciously crafted web content could enable a cross-site scripting (XSS) attack.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: data isolation bypass vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as IMPORTANT severity due to a cookie management issue that allows an attacker to inject maliciously crafted web content, potentially leading to a cross-site scripting (XSS) attack, this flaw occurs because of improper state management during cookie handling, which could allow unauthorized script execution.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44309" }, { "category": "external", "summary": "RHBZ#2327927", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2327927" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44309", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44309" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44309" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-11-21T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: data isolation bypass vulnerability" }, { "cve": "CVE-2024-54467", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-03-20T12:50:18.647000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2353872" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may exfiltrate data cross-origin due to a cookie management issue related to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54467" }, { "category": "external", "summary": "RHBZ#2353872", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353872" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54467" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54467" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" } ], "release_date": "2025-03-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi, and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and used via a graphical interface to process untrusted web content, via GNOME, for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2024-54479", "cwe": { "id": "CWE-404", "name": "Improper Resource Shutdown or Release" }, "discovery_date": "2024-12-23T13:16:54.800976+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333841" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. In affected versions of this package, processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as an Important severity because an attacker can process maliciously crafted web content, potentially leading to an unexpected process crash. This issue can disrupt the system stability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54479" }, { "category": "external", "summary": "RHBZ#2333841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54479", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54479" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54479" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:57:33.957000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "WebKitGTK: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-12-23T13:18:24.328627+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333843" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. Processing maliciously crafted web content may lead to an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54502" }, { "category": "external", "summary": "RHBZ#2333843", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333843" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54502" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:51.903000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54505", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-12-23T13:18:27.108126+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333844" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a type confusion issue due to improper memory handling, causing memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54505" }, { "category": "external", "summary": "RHBZ#2333844", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333844" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54505", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54505" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54505" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121838", "url": "https://support.apple.com/en-us/121838" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:31.052000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2024-12-23T13:18:30.107103+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333845" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54508" }, { "category": "external", "summary": "RHBZ#2333845", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333845" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54508" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:14.487000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-02-10T09:37:24.253576+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344619" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54543" }, { "category": "external", "summary": "RHBZ#2344619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344619" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54543" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2025-01-27T21:46:30.578000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2024-54551", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:23:49.963000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357909" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54551" }, { "category": "external", "summary": "RHBZ#2357909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357909" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54551", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54551" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54551" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24143", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2025-02-10T09:40:08.138428+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344621" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A maliciously crafted web page may be able to fingerprint the user due to improper access restrictions to the file system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a maliciously crafted web page.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24143" }, { "category": "external", "summary": "RHBZ#2344621", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344621" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24143", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24143" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24143" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:05.639000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted web pages or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A maliciously crafted webpage may be able to fingerprint the user" }, { "cve": "CVE-2025-24150", "cwe": { "id": "CWE-77", "name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)" }, "discovery_date": "2025-02-10T09:41:46.644580+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344622" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Copying a URL from Web Inspector may lead to command injection due to improper file handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Copying a URL from Web Inspector may lead to command injection", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into performing unlikely actions, such as enabling and opening the web inspector in an application and loading malicious web content into it. For this reason, this flaw has been rated with a Moderate severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24150" }, { "category": "external", "summary": "RHBZ#2344622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24150", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24150" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24150" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" } ], "release_date": "2025-01-27T21:46:32.259000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Copying a URL from Web Inspector may lead to command injection" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24162", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-02-10T09:44:11.167306+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344624" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper state management.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThis issue can cause an unexpected process crash. Additionally, there is no evidence of remote code execution but this possibility is not discarded.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24162" }, { "category": "external", "summary": "RHBZ#2344624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344624" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24162", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24162" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:54.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-03-12T22:35:00.430000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2351802" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds write due to improper checks to prevent unauthorized actions, causing a break out of Web Content sandbox.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: out-of-bounds write vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is only a risk for servers which utilize a GUI for system administration. This vulnerability can only be exploited when specific packages are used with a graphical interface to process untrusted web content, via GNOME for example.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24201" }, { "category": "external", "summary": "RHBZ#2351802", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2351802" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24201" }, { "category": "external", "summary": "https://support.apple.com/en-us/122281", "url": "https://support.apple.com/en-us/122281" }, { "category": "external", "summary": "https://support.apple.com/en-us/122284", "url": "https://support.apple.com/en-us/122284" }, { "category": "external", "summary": "https://support.apple.com/en-us/122285", "url": "https://support.apple.com/en-us/122285" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0002.html", "url": "https://webkitgtk.org/security/WSA-2025-0002.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2025-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Systems which do not rely on a GUI for system administration (commonly referred to as \"headless\") should confirm that GNOME shell and WebKitGTK are not present on the system.\n\nWebKitGTK3 is no longer used and can therefore be uninstalled without consequence.\n\nWebKitGTK4 is used in Red Hat Enterprise Linux 7 by the following packages: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nTo mitigate this vulnerability, consider removing certain GNOME packages. Note that uninstalling these packages will break functionality in GNOME, however the server can still be used via the terminal interface.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2025-03-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: out-of-bounds write vulnerability" }, { "cve": "CVE-2025-24208", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2025-04-07T14:26:09.363000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357910" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Loading a malicious iframe can cause a cross-site scripting attack due to permissions issues.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24208" }, { "category": "external", "summary": "RHBZ#2357910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357910" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24208" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Loading a malicious iframe may lead to a cross-site scripting attack" }, { "cve": "CVE-2025-24209", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2025-04-07T14:27:43.092000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357911" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a buffer overflow due to improper memory handling and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24209" }, { "category": "external", "summary": "RHBZ#2357911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357911" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24209" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-24213", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-04-07T14:28:47.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357913" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper handling of floats and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A type confusion issue could lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.\n\nThe x86_64 architecture is not vulnerable to this issue, the x86 architecture is not vulnerable when the SSE2 instruction set is enabled, all other architectures are vulnerable to this vulnerability.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24213" }, { "category": "external", "summary": "RHBZ#2357913", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357913" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24213" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: A type confusion issue could lead to memory corruption" }, { "cve": "CVE-2025-24216", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:29:49.645000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357917" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24216" }, { "category": "external", "summary": "RHBZ#2357917", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357917" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24216" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-04-07T14:32:29.265000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357919" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-30427" }, { "category": "external", "summary": "RHBZ#2357919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357919" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30427" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31205", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2025-05-15T13:05:47.441000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366501" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. A malicious website may steal data cross-origin due to improper security checks within the web browser or rendering engine, leading to unauthorized disclosure of information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: A malicious website may exfiltrate data cross-origin", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into visiting a malicious website.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31205" }, { "category": "external", "summary": "RHBZ#2366501", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366501" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31205" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31205" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not visit untrusted websites. Also, do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: A malicious website may exfiltrate data cross-origin" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2025-31257", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:08:57.791000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366504" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31257" }, { "category": "external", "summary": "RHBZ#2366504", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366504" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31257" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31257" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2025-07-07T02:28:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.src", "7Server-optional-ELS:webkitgtk4-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-debuginfo-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-devel-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-doc-0:2.48.3-2.el7_9.noarch", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-0:2.48.3-2.el7_9.x86_64", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.s390x", "7Server-optional-ELS:webkitgtk4-jsc-devel-0:2.48.3-2.el7_9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" } ] }
rhsa-2024:9653
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9653", "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/", "url": "https://access.redhat.com/security/vulnerabilities/" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9653.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:28+00:00", "generator": { "date": "2025-10-09T22:25:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:9653", "initial_release_date": "2024-11-14T12:21:26+00:00", "revision_history": [ { "date": "2024-11-14T12:21:26+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-14T12:21:26+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.src", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.src", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_6?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)", "product_id": "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.src", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)", "product_id": "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "relates_to_product_reference": "AppStream-8.6.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T12:21:26+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9653" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.aarch64", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.ppc64le", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.s390x", "AppStream-8.6.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.src", "AppStream-8.6.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_6.x86_64", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.i686", "AppStream-8.6.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_6.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2024:9679
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9679", "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9679.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:28+00:00", "generator": { "date": "2025-10-09T22:25:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:9679", "initial_release_date": "2024-11-14T15:34:16+00:00", "revision_history": [ { "date": "2024-11-14T15:34:16+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-14T15:34:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_tus:8.4::appstream" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:8.4::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_4.src", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.src", "product_id": "webkit2gtk3-0:2.46.3-1.el8_4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_4?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_4?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.4)", "product_id": "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.src", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.4)", "product_id": "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "relates_to_product_reference": "AppStream-8.4.0.Z.TUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:34:16+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9679" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.E4S:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.ppc64le", "AppStream-8.4.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.src", "AppStream-8.4.0.Z.TUS:webkit2gtk3-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_4.x86_64", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.i686", "AppStream-8.4.0.Z.TUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2024:8496
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:8496", "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/security/vulnerabilities/", "url": "https://access.redhat.com/security/vulnerabilities/" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_8496.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:28+00:00", "generator": { "date": "2025-10-09T22:25:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:8496", "initial_release_date": "2024-10-28T01:13:18+00:00", "revision_history": [ { "date": "2024-10-28T01:13:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-10-28T01:13:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product": { "name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.src", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.src", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.1-1.el9_0?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.1-1.el9_0?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.src", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)", "product_id": "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "relates_to_product_reference": "AppStream-9.0.0.Z.E4S" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-10-28T01:13:18+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:8496" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.src", "AppStream-9.0.0.Z.E4S:webkit2gtk3-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-debugsource-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-devel-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-debuginfo-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-0:2.46.1-1.el9_0.x86_64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.aarch64", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.i686", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.ppc64le", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.s390x", "AppStream-9.0.0.Z.E4S:webkit2gtk3-jsc-devel-debuginfo-0:2.46.1-1.el9_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2023:4201
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: memory corruption issue leading to arbitrary code execution (CVE-2023-32435)\n\n* webkitgtk: type confusion issue leading to arbitrary code execution (CVE-2023-32439)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2023:4201", "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_4201.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:22+00:00", "generator": { "date": "2025-10-09T22:25:22+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2023:4201", "initial_release_date": "2023-07-18T15:43:59+00:00", "revision_history": [ { "date": "2023-07-18T15:43:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2023-07-18T15:43:59+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:22+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.src", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.src", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.3?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.3?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.3?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.3?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.3?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.3?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.3?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.3?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.38.5-1.el9_2.3?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.38.5-1.el9_2.3?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.src", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "relates_to_product_reference": "AppStream-9.2.0.Z.MAIN.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-28198", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238943" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. When processing web content, it may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: use after free vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as the WebKitGTK package is shipped as a dependency for the Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-28198" }, { "category": "external", "summary": "RHBZ#2238943", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238943" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-28198", "url": "https://www.cve.org/CVERecord?id=CVE-2023-28198" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-28198" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0008.html", "url": "https://webkitgtk.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: use after free vulnerability" }, { "cve": "CVE-2023-32435", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218626" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32435" }, { "category": "external", "summary": "RHBZ#2218626", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218626" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32435", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32435" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32435" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2023-32439", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-06-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2218640" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing maliciously crafted web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-32439" }, { "category": "external", "summary": "RHBZ#2218640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218640" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-32439", "url": "https://www.cve.org/CVERecord?id=CVE-2023-32439" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32439" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0005.html", "url": "https://webkitgtk.org/security/WSA-2023-0005.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-06-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useDFGJIT=0, which will disable the data flow graph JIT tier. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-06-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion issue leading to arbitrary code execution" }, { "cve": "CVE-2023-35074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241403" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved memory handling. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-35074" }, { "category": "external", "summary": "RHBZ#2241403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241403" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-35074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-35074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-35074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-37450", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2023-07-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2223000" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-37450" }, { "category": "external", "summary": "RHBZ#2223000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2223000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-37450", "url": "https://www.cve.org/CVERecord?id=CVE-2023-37450" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-37450" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-07-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "This vulnerability can be mitigated by setting the environment variable JSC_useWebAssembly=0, which will disable support for WebAssembly. It\u0027s not necessary to set this environment variable if you\u0027re already using JavaScriptCoreUseJIT=0 to mitigate other CVEs because WebAssembly depends on JIT.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-07-13T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38594", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231018" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38594" }, { "category": "external", "summary": "RHBZ#2231018", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231018" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38594", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38594" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38594" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-38595", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2023-08-10T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2231019" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. This issue occurs when processing malicious web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-38595" }, { "category": "external", "summary": "RHBZ#2231019", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2231019" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-38595", "url": "https://www.cve.org/CVERecord?id=CVE-2023-38595" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38595" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0007.html", "url": "https://webkitgtk.org/security/WSA-2023-0007.html" } ], "release_date": "2023-08-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: arbitrary code execution" }, { "cve": "CVE-2023-41074", "discovery_date": "2023-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2241412" } ], "notes": [ { "category": "description", "text": "The issue was addressed with improved checks. This issue is fixed in tvOS 17, Safari 17, watchOS 10, iOS 17 and iPadOS 17, macOS Sonoma 14. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "The webkitgtk versions as shipped with Red Hat Enterprise Linux 8 and 9 are not affected by this vulnerability. This flaw relies on webkitgtk\u0027s JIT to be enabled while this feature was previously disabled in Red Hat Enterprise Linux 8 and 9 by the following erratas:\n\nRed Hat Enterprise Linux 8: https://access.redhat.com/errata/RHSA-2023:4202\nRed Hat Enterprise Linux 9: https://access.redhat.com/errata/RHSA-2023:4201", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41074" }, { "category": "external", "summary": "RHBZ#2241412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2241412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41074", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41074" } ], "release_date": "2023-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-41993", "discovery_date": "2023-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2240522" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk. This issue occurs when processing web content, which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: processing malicious web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue doesn\u0027t affect the versions of webkitgtk as shipped with Red Hat Enterprise Linux 8 and 9 as the flaw relies on JIT engine. JIT was disabled in the past when the fixes for CVE-2023-32435 and CVE-2023-32439 were released.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-41993" }, { "category": "external", "summary": "RHBZ#2240522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240522" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-41993", "url": "https://www.cve.org/CVERecord?id=CVE-2023-41993" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-41993" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-09-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-09-25T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: processing malicious web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42916", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253054" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may cause an out-of-bounds read due to an improper input validation, resulting in sensitive content leaking.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Out-of-bounds read leads to sensitive data leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The WebKitGTK package versions, as shipped with Red Hat Enterprise 8 and 9, are not affected by this vulnerability. This flaw is related to the JIT code, which is currently disabled by default on both Red Hat Enterprise Linux versions.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42916" }, { "category": "external", "summary": "RHBZ#2253054", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253054" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42916", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42916" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42916" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Out-of-bounds read leads to sensitive data leak" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-23252", "discovery_date": "2024-03-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2270288" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKit. This flaw allows an attacker to trigger a denial of service condition by convincing a victim to visit a specially crafted website.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: processing malicious web content may lead to denial-of-service", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23252" }, { "category": "external", "summary": "RHBZ#2270288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2270288" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23252", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23252" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23252" }, { "category": "external", "summary": "https://seclists.org/fulldisclosure/2024/Mar/21", "url": "https://seclists.org/fulldisclosure/2024/Mar/21" } ], "release_date": "2024-03-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkit: processing malicious web content may lead to denial-of-service" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27834", "cwe": { "id": "CWE-288", "name": "Authentication Bypass Using an Alternate Path or Channel" }, "discovery_date": "2024-05-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2282412" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in Webkit. This flaw allows an attacker with arbitrary read and write capability to bypass pointer authentication.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: pointer authentication bypass", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27834" }, { "category": "external", "summary": "RHBZ#2282412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2282412" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27834", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27834" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27834" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0003.html", "url": "https://webkitgtk.org/security/WSA-2024-0003.html" } ], "release_date": "2024-05-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: pointer authentication bypass" }, { "cve": "CVE-2024-54658", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-11T16:12:08.426000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344946" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54658" }, { "category": "external", "summary": "RHBZ#2344946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54658", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54658" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54658" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-02-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24158", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "discovery_date": "2025-02-10T09:43:02.859455+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344623" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a denial of service due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to a denial-of-service", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24158" }, { "category": "external", "summary": "RHBZ#2344623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24158", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24158" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24158" }, { "category": "external", "summary": "https://support.apple.com/en-us/122066", "url": "https://support.apple.com/en-us/122066" }, { "category": "external", "summary": "https://support.apple.com/en-us/122068", "url": "https://support.apple.com/en-us/122068" }, { "category": "external", "summary": "https://support.apple.com/en-us/122071", "url": "https://support.apple.com/en-us/122071" }, { "category": "external", "summary": "https://support.apple.com/en-us/122072", "url": "https://support.apple.com/en-us/122072" }, { "category": "external", "summary": "https://support.apple.com/en-us/122073", "url": "https://support.apple.com/en-us/122073" }, { "category": "external", "summary": "https://support.apple.com/en-us/122074", "url": "https://support.apple.com/en-us/122074" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-27T21:45:49.015000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing web content may lead to a denial-of-service" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2023-07-18T15:43:59+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2023:4201" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.src", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-debugsource-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-debuginfo-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-0:2.38.5-1.el9_2.3.x86_64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.aarch64", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.i686", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.ppc64le", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.s390x", "AppStream-9.2.0.Z.MAIN.EUS:webkit2gtk3-jsc-devel-debuginfo-0:2.38.5-1.el9_2.3.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
rhsa-2024:9680
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Memory corruption issue when processing web content (CVE-2022-32885)\n\n* webkitgtk: arbitrary javascript code execution (CVE-2023-40397)\n\n* webkitgtk: Arbitrary Remote Code Execution (CVE-2023-42917)\n\n* webkitgtk: type confusion may lead to arbitrary code execution (CVE-2024-23222)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2023-42852)\n\n* chromium-browser: Use after free in ANGLE (CVE-2024-4558)\n\n* webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution (CVE-2024-40776)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-40789)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40780)\n\n* webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking (CVE-2024-40779)\n\n* webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management (CVE-2024-40782)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27808)\n\n* webkitgtk: Processing web content may lead to arbitrary code execution (CVE-2024-27820)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27833)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2024-27851)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44185)\n\n* webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash (CVE-2024-44244)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2024:9680", "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_9680.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security update", "tracking": { "current_release_date": "2025-10-09T22:25:29+00:00", "generator": { "date": "2025-10-09T22:25:29+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.9" } }, "id": "RHSA-2024:9680", "initial_release_date": "2024-11-14T15:24:51+00:00", "revision_history": [ { "date": "2024-11-14T15:24:51+00:00", "number": "1", "summary": "Initial version" }, { "date": "2024-11-14T15:24:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-10-09T22:25:29+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product": { "name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_2.src", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.src", "product_id": "webkit2gtk3-0:2.46.3-1.el8_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_2?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_2?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.46.3-1.el8_2?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.46.3-1.el8_2?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.src", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)", "product_id": "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "relates_to_product_reference": "AppStream-8.2.0.Z.AUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-32885", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "discovery_date": "2023-09-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2236842" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. This security issue occurs when processing maliciously crafted web content that may lead to arbitrary code execution. This memory corruption issue was addressed with improved validation.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue when processing web content", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32885" }, { "category": "external", "summary": "RHBZ#2236842", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2236842" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32885", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32885" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32885" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0003.html", "url": "https://webkitgtk.org/security/WSA-2023-0003.html" } ], "release_date": "2023-04-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue when processing web content" }, { "cve": "CVE-2023-40397", "cwe": { "id": "CWE-96", "name": "Improper Neutralization of Directives in Statically Saved Code (\u0027Static Code Injection\u0027)" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238945" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to cause arbitrary javascript code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: arbitrary javascript code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package. Additionally, Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-40397" }, { "category": "external", "summary": "RHBZ#2238945", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238945" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-40397", "url": "https://www.cve.org/CVERecord?id=CVE-2023-40397" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-40397" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2023-0008.html", "url": "https://wpewebkit.org/security/WSA-2023-0008.html" } ], "release_date": "2023-09-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: arbitrary javascript code execution" }, { "cve": "CVE-2023-42852", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-03-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2271456" } ], "notes": [ { "category": "description", "text": "A logic issue was addressed with improved checks. This issue is fixed in iOS 17.1 and iPadOS 17.1, watchOS 10.1, iOS 16.7.2 and iPadOS 16.7.2, macOS Sonoma 14.1, Safari 17.1, tvOS 17.1. Processing web content may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated important because it affects the confidentiality, integrity, and availability (CIA) of systems, with a high severity rating.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42852" }, { "category": "external", "summary": "RHBZ#2271456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2271456" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42852", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42852" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42852" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0010.html", "url": "https://webkitgtk.org/security/WSA-2023-0010.html" } ], "release_date": "2023-11-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42875", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T12:59:19.828000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366497" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42875" }, { "category": "external", "summary": "RHBZ#2366497", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366497" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42875", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42875" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42875" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2023-42917", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-12-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2253058" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Arbitrary Remote Code Execution", "title": "Vulnerability summary" }, { "category": "other", "text": "All versions of Red Hat Enterprise Linux are affected to this vulnerability. To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42917" }, { "category": "external", "summary": "RHBZ#2253058", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2253058" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42917", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42917" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42917" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2023-0011.html", "url": "https://webkitgtk.org/security/WSA-2023-0011.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2023-12-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-12-04T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Arbitrary Remote Code Execution" }, { "cve": "CVE-2023-42970", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:01:32.590000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366498" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory management and result in arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2023-42970" }, { "category": "external", "summary": "RHBZ#2366498", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366498" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2023-42970", "url": "https://www.cve.org/CVERecord?id=CVE-2023-42970" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970", "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-42970" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-4558", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-05-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2279689" } ], "notes": [ { "category": "description", "text": "Use after free in ANGLE in Google Chrome prior to 124.0.6367.155 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", "title": "Vulnerability description" }, { "category": "summary", "text": "chromium-browser: Use after free in ANGLE", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-4558" }, { "category": "external", "summary": "RHBZ#2279689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2279689" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-4558", "url": "https://www.cve.org/CVERecord?id=CVE-2024-4558" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-4558" } ], "release_date": "2024-05-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "chromium-browser: Use after free in ANGLE" }, { "cve": "CVE-2024-23222", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2024-01-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2259893" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content may lead to remote code execution due to a type confusion issue. This vulnerability is known to be actively exploited in the wild and was included in the CISA\u0027s KEV catalog.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: type confusion may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw depends on the WebKitGTK JIT engine to be enabled. This feature has been disabled in Red Hat Enterprise Linux 8.8 and 9.2 by the errata RHSA-2023:4202 and RHSA-2023:4201. Therefore, Red Hat Enterprise Linux 8.8 and 9.2, when these errata are applied, and newer versions are not affected by this vulnerability.\n\nRHSA-2023:4202: https://access.redhat.com/errata/RHSA-2023:4202\nRHSA-2023:4201: https://access.redhat.com/errata/RHSA-2023:4201\n\nTo exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content. For this reason, this flaw was rated with an important, and not critical, severity.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-23222" }, { "category": "external", "summary": "RHBZ#2259893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2259893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-23222", "url": "https://www.cve.org/CVERecord?id=CVE-2024-23222" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-23222" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0001.html", "url": "https://webkitgtk.org/security/WSA-2024-0001.html" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2024-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content. Please update the affected package as soon as possible.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "exploit_status", "date": "2024-01-23T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "webkitgtk: type confusion may lead to arbitrary code execution" }, { "cve": "CVE-2024-27808", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:36:18.356000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314697" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27808" }, { "category": "external", "summary": "RHBZ#2314697", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314697" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27808", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27808" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27808" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27820", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:37:48.081000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314698" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient memory handling, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27820" }, { "category": "external", "summary": "RHBZ#2314698", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314698" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27820", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27820" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27820" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27833", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:40:34.042000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314700" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient input validation, which attackers could exploit to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27833" }, { "category": "external", "summary": "RHBZ#2314700", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314700" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27833", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27833" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27833" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27851", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2024-09-25T15:44:41.235000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2314704" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKit. This flaw allows a remote attacker to perform arbitrary code execution when processing web content. This flaw is caused by insufficient bounds checks, which could be exploited by attackers to execute malicious code on affected systems.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This WebKit vulnerability marked as important because it enables remote attackers to execute malicious code on users\u0027 systems just by visiting compromised websites, posing significant risks like data theft and system compromise.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27851" }, { "category": "external", "summary": "RHBZ#2314704", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2314704" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27851", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27851" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27851" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0005.html", "url": "https://webkitgtk.org/security/WSA-2024-0005.html" } ], "release_date": "2024-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2024-27856", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "discovery_date": "2025-02-10T09:34:34.705418+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2344618" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause unexpected app termination or arbitrary code execution due to improper checks.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-27856" }, { "category": "external", "summary": "RHBZ#2344618", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344618" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-27856", "url": "https://www.cve.org/CVERecord?id=CVE-2024-27856" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-27856" }, { "category": "external", "summary": "https://support.apple.com/en-us/120896", "url": "https://support.apple.com/en-us/120896" }, { "category": "external", "summary": "https://support.apple.com/en-us/120898", "url": "https://support.apple.com/en-us/120898" }, { "category": "external", "summary": "https://support.apple.com/en-us/120901", "url": "https://support.apple.com/en-us/120901" }, { "category": "external", "summary": "https://support.apple.com/en-us/120902", "url": "https://support.apple.com/en-us/120902" }, { "category": "external", "summary": "https://support.apple.com/en-us/120903", "url": "https://support.apple.com/en-us/120903" }, { "category": "external", "summary": "https://support.apple.com/en-us/120905", "url": "https://support.apple.com/en-us/120905" }, { "category": "external", "summary": "https://support.apple.com/en-us/120906", "url": "https://support.apple.com/en-us/120906" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0001.html", "url": "https://webkitgtk.org/security/WSA-2025-0001.html" } ], "release_date": "2025-01-15T19:35:57.075000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing a file may lead to unexpected app termination or arbitrary code execution" }, { "cve": "CVE-2024-40776", "discovery_date": "2024-07-30T20:48:03+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2301841" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK. A use-after-free may lead to Remote Code Execution. Users are advised to avoid processing untrusted web content in WebKitGTK.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40776" }, { "category": "external", "summary": "RHBZ#2301841", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2301841" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40776", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40776" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40776" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html", "url": "https://webkitgtk.org/security/WSA-2024-0004.html" } ], "release_date": "2024-07-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use after free may lead to Remote Code Execution" }, { "cve": "CVE-2024-40779", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:05:50+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302070" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40779" }, { "category": "external", "summary": "RHBZ#2302070", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302070" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40779", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40779" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40779" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40779" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40780", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:07:22+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302069" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40780" }, { "category": "external", "summary": "RHBZ#2302069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40780", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40780" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40780" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40780" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Out-of-bounds read was addressed with improved bounds checking" }, { "cve": "CVE-2024-40782", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2024-07-31T14:57:24+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302071" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger a use-after-free issue due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40782" }, { "category": "external", "summary": "RHBZ#2302071", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302071" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40782", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40782" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40782" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40782" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Use-after-free was addressed with improved memory management" }, { "cve": "CVE-2024-40789", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "discovery_date": "2024-07-31T15:39:05+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2302067" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can trigger an out-of-bounds read due to improper bounds checking, causing an unexpected process crash, resulting in a denial of service.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-40789" }, { "category": "external", "summary": "RHBZ#2302067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2302067" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-40789", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-40789" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789", "url": "https://webkitgtk.org/security/WSA-2024-0004.html#CVE-2024-40789" } ], "release_date": "2024-07-29T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44185", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T20:05:39.339000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323263" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to the program crashing. Code execution is not discarded as a consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "This vulnerability is rated as important severity because it allows maliciously crafted web content to crash the application, potentially leads to denial of service. While it does not compromise confidentiality or integrity, the ability to crash the program without requiring authentication poses a significant risk.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44185" }, { "category": "external", "summary": "RHBZ#2323263", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323263" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44185", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44185" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44185" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2024-0006.html", "url": "https://webkitgtk.org/security/WSA-2024-0006.html" } ], "release_date": "2024-10-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-44244", "cwe": { "id": "CWE-788", "name": "Access of Memory Location After End of Buffer" }, "discovery_date": "2024-11-01T21:06:58.389000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2323278" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where processing maliciously crafted web content may lead to program to a crash. This issue occurs because code execution is not discarded as consequence.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-44244" }, { "category": "external", "summary": "RHBZ#2323278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323278" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-44244", "url": "https://www.cve.org/CVERecord?id=CVE-2024-44244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-44244" } ], "release_date": "2024-01-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 4.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: webkit2gtk: Processing maliciously crafted web content may lead to an unexpected process crash" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2024-12-23T13:18:32.596325+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2333846" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause memory corruption due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkit: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2024-54534" }, { "category": "external", "summary": "RHBZ#2333846", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2333846" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-54534" }, { "category": "external", "summary": "https://support.apple.com/en-us/121837", "url": "https://support.apple.com/en-us/121837" }, { "category": "external", "summary": "https://support.apple.com/en-us/121839", "url": "https://support.apple.com/en-us/121839" }, { "category": "external", "summary": "https://support.apple.com/en-us/121843", "url": "https://support.apple.com/en-us/121843" }, { "category": "external", "summary": "https://support.apple.com/en-us/121844", "url": "https://support.apple.com/en-us/121844" }, { "category": "external", "summary": "https://support.apple.com/en-us/121845", "url": "https://support.apple.com/en-us/121845" }, { "category": "external", "summary": "https://support.apple.com/en-us/121846", "url": "https://support.apple.com/en-us/121846" } ], "release_date": "2024-12-11T22:58:39.974000+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkit: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24223", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2025-05-15T13:03:40.562000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366499" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a use-after-free issue due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24223" }, { "category": "external", "summary": "RHBZ#2366499", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366499" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24223", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24223" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24223" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-24264", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2025-04-07T14:31:23.097000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2357918" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-24264" }, { "category": "external", "summary": "RHBZ#2357918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2357918" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0003.html", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" } ], "release_date": "2025-04-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31204", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2025-05-15T13:04:43.281000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366500" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause out-of-bounds memory access due to improper memory handling and result in memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31204" }, { "category": "external", "summary": "RHBZ#2366500", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366500" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31204" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31204" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to memory corruption" }, { "cve": "CVE-2025-31206", "cwe": { "id": "CWE-843", "name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)" }, "discovery_date": "2025-05-15T13:06:54.355000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366502" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a type confusion issue due to improper state handling and result in an unexpected crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31206" }, { "category": "external", "summary": "RHBZ#2366502", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366502" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31206" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31206" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected Safari crash" }, { "cve": "CVE-2025-31215", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2025-05-15T13:07:56.027000+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2366503" } ], "notes": [ { "category": "description", "text": "A flaw was found in WebKitGTK. Processing malicious web content can cause a NULL pointer dereference due to improper checks, resulting in an unexpected process crash.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash", "title": "Vulnerability summary" }, { "category": "other", "text": "To exploit this flaw, an attacker needs to trick a user into processing or loading malicious web content.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2025-31215" }, { "category": "external", "summary": "RHBZ#2366503", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2366503" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2025-31215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31215" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-31215" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2025-0004.html", "url": "https://webkitgtk.org/security/WSA-2025-0004.html" } ], "release_date": "2025-05-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2024-11-14T15:24:51+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2024:9680" }, { "category": "workaround", "details": "Do not process or load untrusted web content with WebKitGTK.\n\nIn Red Hat Enterprise Linux 7, the following packages require WebKitGTK4: evolution-data-server, glade, gnome-boxes, gnome-initial-setup, gnome-online-accounts, gnome-shell, shotwell, sushi and yelp.\n\nThis vulnerability can only be exploited when these packages are installed in the system and being used via a graphical interface to process untrusted web content, via GNOME for example. In gnome-shell, the vulnerability can be exploited by an attacker from the local network without user interaction.\n\nTo mitigate this vulnerability, consider removing these packages. Note that some of these packages are required by GNOME, removing them will also remove GNOME and other packages, breaking functionality. However, the server can still be used via the terminal interface.\n\nAdditionally, WebKitGTK3 is not required by any package. Therefore, it can be removed without consequences or break of functionality.", "product_ids": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.src", "AppStream-8.2.0.Z.AUS:webkit2gtk3-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-debugsource-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-devel-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-debuginfo-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-0:2.46.3-1.el8_2.x86_64", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.i686", "AppStream-8.2.0.Z.AUS:webkit2gtk3-jsc-devel-debuginfo-0:2.46.3-1.el8_2.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to an unexpected process crash" } ] }
CERTFR-2025-AVI-0258
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et une atteinte à la confidentialité des données.
Apple indique que les vulnérabilités CVE-2025-24200 et CVE-2025-24201 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Vendor | Product | Description | ||
---|---|---|---|---|
Apple | iPadOS | iPadOS versions antérieures à 17.7.6 | ||
Apple | iOS | iOS versions antérieures à 18.4 | ||
Apple | N/A | Xcode versions antérieures à 16.3 | ||
Apple | iOS | iOS versions antérieures à 16.7.11 | ||
Apple | visionOS | visionOS versions antérieures à 2.4 | ||
Apple | macOS | macOS Ventura versions antérieures à 13.7.5 | ||
Apple | tvOS | tvOS versions antérieures à 18.4 | ||
Apple | macOS | macOS Sequoia versions antérieures à 15.4 | ||
Apple | macOS | macOS Sonoma versions antérieures à 14.7.5 | ||
Apple | iPadOS | iPadOS versions antérieures à 18.4 | ||
Apple | iOS | iOS versions antérieures à 15.8.4 | ||
Apple | iPadOS | iPadOS versions antérieures à 16.7.11 | ||
Apple | iPadOS | iPadOS versions antérieures à 15.8.4 | ||
Apple | Safari | Safari versions antérieures à 18.4 |
Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "iPadOS versions ant\u00e9rieures \u00e0 17.7.6", "product": { "name": "iPadOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iOS versions ant\u00e9rieures \u00e0 18.4", "product": { "name": "iOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Xcode versions ant\u00e9rieures \u00e0 16.3", "product": { "name": "N/A", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iOS versions ant\u00e9rieures \u00e0 16.7.11", "product": { "name": "iOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "visionOS versions ant\u00e9rieures \u00e0 2.4", "product": { "name": "visionOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Ventura versions ant\u00e9rieures \u00e0 13.7.5", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "tvOS versions ant\u00e9rieures \u00e0 18.4", "product": { "name": "tvOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.4", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.7.5", "product": { "name": "macOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPadOS versions ant\u00e9rieures \u00e0 18.4", "product": { "name": "iPadOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iOS versions ant\u00e9rieures \u00e0 15.8.4", "product": { "name": "iOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPadOS versions ant\u00e9rieures \u00e0 16.7.11", "product": { "name": "iPadOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "iPadOS versions ant\u00e9rieures \u00e0 15.8.4", "product": { "name": "iPadOS", "vendor": { "name": "Apple", "scada": false } } }, { "description": "Safari versions ant\u00e9rieures \u00e0 18.4", "product": { "name": "Safari", "vendor": { "name": "Apple", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2025-24206", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24206" }, { "name": "CVE-2024-54508", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54508" }, { "name": "CVE-2025-24205", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24205" }, { "name": "CVE-2024-9681", "url": "https://www.cve.org/CVERecord?id=CVE-2024-9681" }, { "name": "CVE-2025-24266", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24266" }, { "name": "CVE-2024-54502", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54502" }, { "name": "CVE-2025-24273", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24273" }, { "name": "CVE-2025-30425", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30425" }, { "name": "CVE-2025-24200", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24200" }, { "name": "CVE-2025-24228", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24228" }, { "name": "CVE-2025-24210", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24210" }, { "name": "CVE-2025-24265", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24265" }, { "name": "CVE-2025-24260", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24260" }, { "name": "CVE-2025-24249", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24249" }, { "name": "CVE-2025-30455", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30455" }, { "name": "CVE-2025-30471", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30471" }, { "name": "CVE-2025-30465", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30465" }, { "name": "CVE-2025-24253", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24253" }, { "name": "CVE-2025-30447", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30447" }, { "name": "CVE-2025-30445", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30445" }, { "name": "CVE-2025-24207", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24207" }, { "name": "CVE-2025-24240", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24240" }, { "name": "CVE-2025-24229", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24229" }, { "name": "CVE-2025-24246", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24246" }, { "name": "CVE-2025-24182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24182" }, { "name": "CVE-2025-24279", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24279" }, { "name": "CVE-2025-24271", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24271" }, { "name": "CVE-2025-30469", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30469" }, { "name": "CVE-2025-24178", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24178" }, { "name": "CVE-2025-30463", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30463" }, { "name": "CVE-2025-30457", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30457" }, { "name": "CVE-2025-24126", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24126" }, { "name": "CVE-2025-24204", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24204" }, { "name": "CVE-2025-24216", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24216" }, { "name": "CVE-2024-56171", "url": "https://www.cve.org/CVERecord?id=CVE-2024-56171" }, { "name": "CVE-2025-30462", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30462" }, { "name": "CVE-2025-30467", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30467" }, { "name": "CVE-2025-24262", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24262" }, { "name": "CVE-2025-24270", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24270" }, { "name": "CVE-2025-24194", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24194" }, { "name": "CVE-2025-24267", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24267" }, { "name": "CVE-2025-24235", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24235" }, { "name": "CVE-2025-24193", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24193" }, { "name": "CVE-2025-24281", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24281" }, { "name": "CVE-2025-24221", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24221" }, { "name": "CVE-2025-24257", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24257" }, { "name": "CVE-2025-31187", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31187" }, { "name": "CVE-2025-30449", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30449" }, { "name": "CVE-2025-24263", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24263" }, { "name": "CVE-2025-24191", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24191" }, { "name": "CVE-2025-30464", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30464" }, { "name": "CVE-2025-30429", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30429" }, { "name": "CVE-2025-24280", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24280" }, { "name": "CVE-2025-30452", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30452" }, { "name": "CVE-2025-24085", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24085" }, { "name": "CVE-2025-24203", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24203" }, { "name": "CVE-2025-24247", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24247" }, { "name": "CVE-2025-24211", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24211" }, { "name": "CVE-2025-24198", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24198" }, { "name": "CVE-2025-24131", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24131" }, { "name": "CVE-2023-27043", "url": "https://www.cve.org/CVERecord?id=CVE-2023-27043" }, { "name": "CVE-2025-24164", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24164" }, { "name": "CVE-2025-24255", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24255" }, { "name": "CVE-2025-24283", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24283" }, { "name": "CVE-2024-48958", "url": "https://www.cve.org/CVERecord?id=CVE-2024-48958" }, { "name": "CVE-2025-24170", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24170" }, { "name": "CVE-2025-24093", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24093" }, { "name": "CVE-2025-24173", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24173" }, { "name": "CVE-2025-24218", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24218" }, { "name": "CVE-2025-24097", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24097" }, { "name": "CVE-2025-30435", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30435" }, { "name": "CVE-2024-40864", "url": "https://www.cve.org/CVERecord?id=CVE-2024-40864" }, { "name": "CVE-2025-24157", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24157" }, { "name": "CVE-2025-24278", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24278" }, { "name": "CVE-2025-24264", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24264" }, { "name": "CVE-2025-24172", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24172" }, { "name": "CVE-2025-30451", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30451" }, { "name": "CVE-2025-24212", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24212" }, { "name": "CVE-2025-24252", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24252" }, { "name": "CVE-2025-24199", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24199" }, { "name": "CVE-2025-24239", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24239" }, { "name": "CVE-2025-24139", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24139" }, { "name": "CVE-2025-24237", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24237" }, { "name": "CVE-2025-24254", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24254" }, { "name": "CVE-2025-24226", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24226" }, { "name": "CVE-2025-24238", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24238" }, { "name": "CVE-2025-30450", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30450" }, { "name": "CVE-2025-24192", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24192" }, { "name": "CVE-2025-24236", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24236" }, { "name": "CVE-2025-24167", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24167" }, { "name": "CVE-2025-24232", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24232" }, { "name": "CVE-2025-31194", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31194" }, { "name": "CVE-2025-30458", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30458" }, { "name": "CVE-2025-24261", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24261" }, { "name": "CVE-2025-30424", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30424" }, { "name": "CVE-2025-30430", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30430" }, { "name": "CVE-2025-30444", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30444" }, { "name": "CVE-2025-24282", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24282" }, { "name": "CVE-2025-24256", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24256" }, { "name": "CVE-2025-24259", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24259" }, { "name": "CVE-2025-24181", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24181" }, { "name": "CVE-2025-31197", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31197" }, { "name": "CVE-2025-24233", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24233" }, { "name": "CVE-2025-24241", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24241" }, { "name": "CVE-2025-24215", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24215" }, { "name": "CVE-2025-24214", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24214" }, { "name": "CVE-2025-30439", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30439" }, { "name": "CVE-2025-24113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24113" }, { "name": "CVE-2025-30460", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30460" }, { "name": "CVE-2025-30434", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30434" }, { "name": "CVE-2025-31192", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31192" }, { "name": "CVE-2025-30428", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30428" }, { "name": "CVE-2025-24196", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24196" }, { "name": "CVE-2025-24242", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24242" }, { "name": "CVE-2025-30438", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30438" }, { "name": "CVE-2025-27113", "url": "https://www.cve.org/CVERecord?id=CVE-2025-27113" }, { "name": "CVE-2025-30437", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30437" }, { "name": "CVE-2025-30432", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30432" }, { "name": "CVE-2024-54533", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54533" }, { "name": "CVE-2025-24129", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24129" }, { "name": "CVE-2025-24217", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24217" }, { "name": "CVE-2025-24272", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24272" }, { "name": "CVE-2025-24213", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24213" }, { "name": "CVE-2025-24095", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24095" }, { "name": "CVE-2025-30456", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30456" }, { "name": "CVE-2025-24209", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24209" }, { "name": "CVE-2025-24276", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24276" }, { "name": "CVE-2025-24179", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24179" }, { "name": "CVE-2025-24208", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24208" }, { "name": "CVE-2025-24190", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24190" }, { "name": "CVE-2025-30441", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30441" }, { "name": "CVE-2025-24248", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24248" }, { "name": "CVE-2025-24243", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24243" }, { "name": "CVE-2025-31191", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31191" }, { "name": "CVE-2025-31184", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31184" }, { "name": "CVE-2025-24245", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24245" }, { "name": "CVE-2025-30470", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30470" }, { "name": "CVE-2025-31182", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31182" }, { "name": "CVE-2025-24251", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24251" }, { "name": "CVE-2025-24195", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24195" }, { "name": "CVE-2024-54543", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54543" }, { "name": "CVE-2025-24250", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24250" }, { "name": "CVE-2025-24234", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24234" }, { "name": "CVE-2025-24180", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24180" }, { "name": "CVE-2025-24177", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24177" }, { "name": "CVE-2025-30454", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30454" }, { "name": "CVE-2025-30461", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30461" }, { "name": "CVE-2025-24244", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24244" }, { "name": "CVE-2025-24230", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24230" }, { "name": "CVE-2025-24148", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24148" }, { "name": "CVE-2025-24163", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24163" }, { "name": "CVE-2025-24231", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24231" }, { "name": "CVE-2025-24277", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24277" }, { "name": "CVE-2025-24269", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24269" }, { "name": "CVE-2024-54534", "url": "https://www.cve.org/CVERecord?id=CVE-2024-54534" }, { "name": "CVE-2025-24201", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24201" }, { "name": "CVE-2025-31188", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31188" }, { "name": "CVE-2025-24202", "url": "https://www.cve.org/CVERecord?id=CVE-2025-24202" }, { "name": "CVE-2025-30446", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30446" }, { "name": "CVE-2025-30433", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30433" }, { "name": "CVE-2025-30443", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30443" }, { "name": "CVE-2025-30426", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30426" }, { "name": "CVE-2025-30427", "url": "https://www.cve.org/CVERecord?id=CVE-2025-30427" }, { "name": "CVE-2025-31183", "url": "https://www.cve.org/CVERecord?id=CVE-2025-31183" } ], "initial_release_date": "2025-04-01T00:00:00", "last_revision_date": "2025-04-30T00:00:00", "links": [], "reference": "CERTFR-2025-AVI-0258", "revisions": [ { "description": "Version initiale", "revision_date": "2025-04-01T00:00:00.000000" }, { "description": "Ajout de multiples identifiants CVE.", "revision_date": "2025-04-30T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n\nApple indique que les vuln\u00e9rabilit\u00e9s CVE-2025-24200 et CVE-2025-24201 sont activement exploit\u00e9es.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple", "vendor_advisories": [ { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122378", "url": "https://support.apple.com/en-us/122378" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122371", "url": "https://support.apple.com/en-us/122371" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122380", "url": "https://support.apple.com/en-us/122380" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122379", "url": "https://support.apple.com/en-us/122379" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122345", "url": "https://support.apple.com/en-us/122345" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122373", "url": "https://support.apple.com/en-us/122373" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122372", "url": "https://support.apple.com/en-us/122372" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122377", "url": "https://support.apple.com/en-us/122377" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122346", "url": "https://support.apple.com/en-us/122346" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122374", "url": "https://support.apple.com/en-us/122374" }, { "published_at": "2025-03-31", "title": "Bulletin de s\u00e9curit\u00e9 Apple 122375", "url": "https://support.apple.com/en-us/122375" } ] }
ncsc-2025-0103
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten onder andere geheugenbeheerproblemen, ongeautoriseerde toegang tot gevoelige gebruikersdata, en de mogelijkheid voor applicaties om hun sandbox-omgevingen te ontsnappen. Deze kwetsbaarheden konden leiden tot ongeautoriseerde toegang, gegevenswijzigingen, of zelfs Denial-of-Service. Voor succesvol misbruik moet de kwaadwillende het slachtoffer misleiden een malafide app te installeren of link te volgen.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Comparison Using Wrong Factors", "title": "CWE-1025" }, { "category": "general", "text": "Incorrect Comparison", "title": "CWE-697" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Incorrect Authorization", "title": "CWE-863" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - ncscclear", "url": "https://support.apple.com/en-us/122345" }, { "category": "external", "summary": "Reference - ncscclear", "url": "https://support.apple.com/en-us/122346" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122372" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122371" } ], "title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS", "tracking": { "current_release_date": "2025-04-01T08:42:27.059536Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0103", "initial_release_date": "2025-04-01T08:42:27.059536Z", "revision_history": [ { "date": "2025-04-01T08:42:27.059536Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:apple/16.7.11", "product": { "name": "vers:apple/16.7.11", "product_id": "CSAFPID-2588450" } }, { "category": "product_version_range", "name": "vers:apple/18.2", "product": { "name": "vers:apple/18.2", "product_id": "CSAFPID-1432307" } }, { "category": "product_version_range", "name": "vers:apple/18.3", "product": { "name": "vers:apple/18.3", "product_id": "CSAFPID-1902947" } }, { "category": "product_version_range", "name": "vers:apple/18.3.2", "product": { "name": "vers:apple/18.3.2", "product_id": "CSAFPID-2462478" } }, { "category": "product_version_range", "name": "vers:apple/18.4", "product": { "name": "vers:apple/18.4", "product_id": "CSAFPID-2588454" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c18.2", "product": { "name": "vers:unknown/\u003c18.2", "product_id": "CSAFPID-1436912" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c18.3", "product": { "name": "vers:unknown/\u003c18.3", "product_id": "CSAFPID-1904380" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c18.3.1", "product": { "name": "vers:unknown/\u003c18.3.1", "product_id": "CSAFPID-2177846" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c18.3.2", "product": { "name": "vers:unknown/\u003c18.3.2", "product_id": "CSAFPID-2469033" } }, { "category": "product_version_range", "name": "vers:apple/15.8.4", "product": { "name": "vers:apple/15.8.4", "product_id": "CSAFPID-2588452" } } ], "category": "product_name", "name": "iOS" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/unknown", "product": { "name": "vers:unknown/unknown", "product_id": "CSAFPID-1332226" } }, { "category": "product_version_range", "name": "vers:unknown/unspecified|\u003c18.2", "product": { "name": "vers:unknown/unspecified|\u003c18.2", "product_id": "CSAFPID-1432291" } }, { "category": "product_version_range", "name": "vers:unknown/unspecified|\u003c18.3", "product": { "name": "vers:unknown/unspecified|\u003c18.3", "product_id": "CSAFPID-1901367" } }, { "category": "product_version_range", "name": "vers:unknown/unspecified|\u003c18.4", "product": { "name": "vers:unknown/unspecified|\u003c18.4", "product_id": "CSAFPID-2590080" } } ], "category": "product_name", "name": "iOS and iPadOS" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/15.0", "product": { "name": "vers:unknown/15.0", "product_id": "CSAFPID-90190", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:iphone_os:15.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/15.1", "product": { "name": "vers:unknown/15.1", "product_id": "CSAFPID-90119" } }, { "category": "product_version_range", "name": "vers:unknown/15.2", "product": { "name": "vers:unknown/15.2", "product_id": "CSAFPID-90182" } }, { "category": "product_version_range", "name": "vers:unknown/15.3", "product": { "name": "vers:unknown/15.3", "product_id": "CSAFPID-773820" } }, { "category": "product_version_range", "name": "vers:unknown/15.4", "product": { "name": "vers:unknown/15.4", "product_id": "CSAFPID-90174" } }, { "category": "product_version_range", "name": "vers:unknown/15.5", "product": { "name": "vers:unknown/15.5", "product_id": "CSAFPID-90216" } }, { "category": "product_version_range", "name": "vers:unknown/15.6", "product": { "name": "vers:unknown/15.6", "product_id": "CSAFPID-90200" } }, { "category": "product_version_range", "name": "vers:unknown/15.7", "product": { "name": "vers:unknown/15.7", "product_id": "CSAFPID-90232" } }, { "category": "product_version_range", "name": "vers:unknown/15.8", "product": { "name": "vers:unknown/15.8", "product_id": "CSAFPID-90303" } }, { "category": "product_version_range", "name": "vers:unknown/15.8.1", "product": { "name": "vers:unknown/15.8.1", "product_id": "CSAFPID-821264" } }, { "category": "product_version_range", "name": "vers:unknown/16.0", "product": { "name": "vers:unknown/16.0", "product_id": "CSAFPID-90255" } }, { "category": "product_version_range", "name": "vers:unknown/16.1", "product": { "name": "vers:unknown/16.1", "product_id": "CSAFPID-90236" } }, { "category": "product_version_range", "name": "vers:unknown/16.2", "product": { "name": "vers:unknown/16.2", "product_id": "CSAFPID-90241" } }, { "category": "product_version_range", "name": "vers:unknown/16.3", "product": { "name": "vers:unknown/16.3", "product_id": "CSAFPID-90305" } }, { "category": "product_version_range", "name": "vers:unknown/16.4", "product": { "name": "vers:unknown/16.4", "product_id": "CSAFPID-90301" } }, { "category": "product_version_range", "name": "vers:unknown/16.5", "product": { "name": "vers:unknown/16.5", "product_id": "CSAFPID-90297" } }, { "category": "product_version_range", "name": "vers:unknown/16.6", "product": { "name": "vers:unknown/16.6", "product_id": "CSAFPID-90295" } }, { "category": "product_version_range", "name": "vers:unknown/16.7", "product": { "name": "vers:unknown/16.7", "product_id": "CSAFPID-90291" } }, { "category": "product_version_range", "name": "vers:unknown/17.0", "product": { "name": "vers:unknown/17.0", "product_id": "CSAFPID-90302", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:iphone_os:17.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/17.1", "product": { "name": "vers:unknown/17.1", "product_id": "CSAFPID-90306" } }, { "category": "product_version_range", "name": "vers:unknown/17.2", "product": { "name": "vers:unknown/17.2", "product_id": "CSAFPID-90307" } }, { "category": "product_version_range", "name": "vers:unknown/17.3", "product": { "name": "vers:unknown/17.3", "product_id": "CSAFPID-90308" } }, { "category": "product_version_range", "name": "vers:unknown/17.4", "product": { "name": "vers:unknown/17.4", "product_id": "CSAFPID-1077909" } }, { "category": "product_version_range", "name": "vers:unknown/17.5", "product": { "name": "vers:unknown/17.5", "product_id": "CSAFPID-1136180" } }, { "category": "product_version_range", "name": "vers:unknown/17.6", "product": { "name": "vers:unknown/17.6", "product_id": "CSAFPID-1136554" } }, { "category": "product_version_range", "name": "vers:unknown/17.7", "product": { "name": "vers:unknown/17.7", "product_id": "CSAFPID-1136185" } }, { "category": "product_version_range", "name": "vers:unknown/18.0", "product": { "name": "vers:unknown/18.0", "product_id": "CSAFPID-1161343", "product_identification_helper": { "cpe": "cpe:2.3:a:apple:iphone_os:18.0:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/18.1", "product": { "name": "vers:unknown/18.1", "product_id": "CSAFPID-1443657" } }, { "category": "product_version_range", "name": "vers:unknown/18.2", "product": { "name": "vers:unknown/18.2", "product_id": "CSAFPID-1906294" } }, { "category": "product_version_range", "name": "vers:unknown/18.3", "product": { "name": "vers:unknown/18.3", "product_id": "CSAFPID-1987760" } } ], "category": "product_name", "name": "iPhone OS" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:apple/18.2", "product": { "name": "vers:apple/18.2", "product_id": "CSAFPID-1618595" } }, { "category": "product_version_range", "name": "vers:apple/18.3", "product": { "name": "vers:apple/18.3", "product_id": "CSAFPID-1915327" } } ], "category": "product_name", "name": "Iphone Os" } ], "category": "product_family", "name": "Apple" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-24217", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24217", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24217.json" } ], "title": "CVE-2025-24217" }, { "cve": "CVE-2025-24221", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24221", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24221.json" } ], "title": "CVE-2025-24221" }, { "cve": "CVE-2025-24230", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24230", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24230.json" } ], "title": "CVE-2025-24230" }, { "cve": "CVE-2025-24237", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24237.json" } ], "title": "CVE-2025-24237" }, { "cve": "CVE-2025-24238", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24238", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24238.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24238" }, { "cve": "CVE-2025-24243", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24243", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24243.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24243" }, { "cve": "CVE-2025-24244", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24244", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24244.json" } ], "title": "CVE-2025-24244" }, { "cve": "CVE-2025-24257", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24257.json" } ], "title": "CVE-2025-24257" }, { "cve": "CVE-2025-24264", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24264.json" } ], "title": "CVE-2025-24264" }, { "cve": "CVE-2025-24283", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24283", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24283.json" } ], "title": "CVE-2025-24283" }, { "cve": "CVE-2025-27113", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27113.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-27113" }, { "cve": "CVE-2025-30425", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30425.json" } ], "title": "CVE-2025-30425" }, { "cve": "CVE-2025-30426", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-30426" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30427", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30427.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-30427" }, { "cve": "CVE-2025-30428", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30428", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30428.json" } ], "title": "CVE-2025-30428" }, { "cve": "CVE-2025-30429", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30429", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30429.json" } ], "title": "CVE-2025-30429" }, { "cve": "CVE-2025-30430", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30430", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30430.json" } ], "title": "CVE-2025-30430" }, { "cve": "CVE-2025-30432", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30432", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30432.json" } ], "title": "CVE-2025-30432" }, { "cve": "CVE-2025-30433", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30433", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30433.json" } ], "title": "CVE-2025-30433" }, { "cve": "CVE-2025-30434", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30434", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30434.json" } ], "title": "CVE-2025-30434" }, { "cve": "CVE-2025-30438", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30438", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30438.json" } ], "title": "CVE-2025-30438" }, { "cve": "CVE-2025-30439", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30439", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30439.json" } ], "title": "CVE-2025-30439" }, { "cve": "CVE-2025-30447", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30447", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30447.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-30447" }, { "cve": "CVE-2025-30454", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30454.json" } ], "title": "CVE-2025-30454" }, { "cve": "CVE-2025-30456", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30456", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30456.json" } ], "title": "CVE-2025-30456" }, { "cve": "CVE-2025-30463", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30463", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30463.json" } ], "title": "CVE-2025-30463" }, { "cve": "CVE-2025-30465", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30465", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30465.json" } ], "title": "CVE-2025-30465" }, { "cve": "CVE-2025-30467", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30467", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30467.json" } ], "title": "CVE-2025-30467" }, { "cve": "CVE-2025-30469", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30469", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30469.json" } ], "title": "CVE-2025-30469" }, { "cve": "CVE-2025-30470", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30470", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30470.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-30470" }, { "cve": "CVE-2025-30471", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30471.json" } ], "title": "CVE-2025-30471" }, { "cve": "CVE-2025-31182", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31182.json" } ], "title": "CVE-2025-31182" }, { "cve": "CVE-2025-31183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31183.json" } ], "title": "CVE-2025-31183" }, { "cve": "CVE-2025-31184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31184.json" } ], "title": "CVE-2025-31184" }, { "cve": "CVE-2025-31191", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-31191" }, { "cve": "CVE-2025-31192", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31192", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31192.json" } ], "title": "CVE-2025-31192" }, { "cve": "CVE-2024-9681", "cwe": { "id": "CWE-1025", "name": "Comparison Using Wrong Factors" }, "notes": [ { "category": "other", "text": "Comparison Using Wrong Factors", "title": "CWE-1025" }, { "category": "other", "text": "Incorrect Comparison", "title": "CWE-697" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9681", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9681.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2024-9681" }, { "cve": "CVE-2024-48958", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-48958", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-48958.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2024-48958" }, { "cve": "CVE-2024-54502", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54502", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54502.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2024-54502" }, { "cve": "CVE-2024-54508", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54508", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54508.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2024-54508" }, { "cve": "CVE-2024-54534", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54534", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54534.json" } ], "title": "CVE-2024-54534" }, { "cve": "CVE-2024-54543", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54543", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54543.json" } ], "title": "CVE-2024-54543" }, { "cve": "CVE-2024-56171", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2024-56171" }, { "cve": "CVE-2025-24085", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json" } ], "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24095", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24095", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24095.json" } ], "title": "CVE-2025-24095" }, { "cve": "CVE-2025-24097", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24097", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24097.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24097" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json" } ], "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24163", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24167", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24167" }, { "cve": "CVE-2025-24173", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24173", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24173.json" } ], "title": "CVE-2025-24173" }, { "cve": "CVE-2025-24178", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24178.json" } ], "title": "CVE-2025-24178" }, { "cve": "CVE-2025-24180", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24180.json" } ], "title": "CVE-2025-24180" }, { "cve": "CVE-2025-24182", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24182.json" } ], "title": "CVE-2025-24182" }, { "cve": "CVE-2025-24190", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24190", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24190.json" } ], "title": "CVE-2025-24190" }, { "cve": "CVE-2025-24192", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24192", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24192.json" } ], "title": "CVE-2025-24192" }, { "cve": "CVE-2025-24193", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24193", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24193.json" } ], "title": "CVE-2025-24193" }, { "cve": "CVE-2025-24194", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24194", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24194.json" } ], "title": "CVE-2025-24194" }, { "cve": "CVE-2025-24198", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24198.json" } ], "title": "CVE-2025-24198" }, { "cve": "CVE-2025-24200", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "other", "text": "Incorrect Authorization", "title": "CWE-863" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24200", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24200.json" } ], "title": "CVE-2025-24200" }, { "cve": "CVE-2025-24201", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24201", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24201.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] } ], "title": "CVE-2025-24201" }, { "cve": "CVE-2025-24202", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24202.json" } ], "title": "CVE-2025-24202" }, { "cve": "CVE-2025-24203", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24203", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24203.json" } ], "title": "CVE-2025-24203" }, { "cve": "CVE-2025-24205", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24205", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24205.json" } ], "title": "CVE-2025-24205" }, { "cve": "CVE-2025-24208", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24208", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24208.json" } ], "title": "CVE-2025-24208" }, { "cve": "CVE-2025-24209", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24209", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24209.json" } ], "title": "CVE-2025-24209" }, { "cve": "CVE-2025-24210", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24210", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24210.json" } ], "title": "CVE-2025-24210" }, { "cve": "CVE-2025-24211", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24211.json" } ], "title": "CVE-2025-24211" }, { "cve": "CVE-2025-24212", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24212", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24212.json" } ], "title": "CVE-2025-24212" }, { "cve": "CVE-2025-24213", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24213", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24213.json" } ], "title": "CVE-2025-24213" }, { "cve": "CVE-2025-24214", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24214", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24214.json" } ], "title": "CVE-2025-24214" }, { "cve": "CVE-2025-24215", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24215.json" } ], "title": "CVE-2025-24215" }, { "cve": "CVE-2025-24216", "product_status": { "known_affected": [ "CSAFPID-2588450", "CSAFPID-1432307", "CSAFPID-1902947", "CSAFPID-2462478", "CSAFPID-2588454", "CSAFPID-1436912", "CSAFPID-1904380", "CSAFPID-2177846", "CSAFPID-2469033", "CSAFPID-1332226", "CSAFPID-1432291", "CSAFPID-1901367", "CSAFPID-2590080", "CSAFPID-2588452", "CSAFPID-90190", "CSAFPID-90119", "CSAFPID-90182", "CSAFPID-773820", "CSAFPID-90174", "CSAFPID-90216", "CSAFPID-90200", "CSAFPID-90232", "CSAFPID-90303", "CSAFPID-821264", "CSAFPID-90255", "CSAFPID-90236", "CSAFPID-90241", "CSAFPID-90305", "CSAFPID-90301", "CSAFPID-90297", "CSAFPID-90295", "CSAFPID-90291", "CSAFPID-90302", "CSAFPID-90306", "CSAFPID-90307", "CSAFPID-90308", "CSAFPID-1077909", "CSAFPID-1136180", "CSAFPID-1136554", "CSAFPID-1136185", "CSAFPID-1618595", "CSAFPID-1915327", "CSAFPID-1161343", "CSAFPID-1443657", "CSAFPID-1906294", "CSAFPID-1987760" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24216", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24216.json" } ], "title": "CVE-2025-24216" } ] }
ncsc-2025-0102
Vulnerability from csaf_ncscnl
Notes
{ "document": { "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE" } }, "lang": "nl", "notes": [ { "category": "legal_disclaimer", "text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings." }, { "category": "description", "text": "Apple heeft meerdere kwetsbaarheden verholpen in macOS (Specifiek voor Ventura 13.7.5, Sequoia 15.4 en Sonoma 14.7.5).", "title": "Feiten" }, { "category": "description", "text": "De kwetsbaarheden omvatten onder andere problemen met ongeautoriseerde toegang tot gevoelige gebruikersdata, logboekregistratie-issues, en kwetsbaarheden die het mogelijk maakten voor applicaties om root-rechten te verkrijgen. Deze kwetsbaarheden konden worden misbruikt door kwaadwillenden om toegang te krijgen tot gevoelige informatie of om systeeminstabiliteit te veroorzaken.", "title": "Interpretaties" }, { "category": "description", "text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", "title": "Oplossingen" }, { "category": "general", "text": "medium", "title": "Kans" }, { "category": "general", "text": "high", "title": "Schade" }, { "category": "general", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "Use After Free", "title": "CWE-416" }, { "category": "general", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" }, { "category": "general", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" }, { "category": "general", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "general", "text": "Out-of-bounds Write", "title": "CWE-787" }, { "category": "general", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "general", "text": "Comparison Using Wrong Factors", "title": "CWE-1025" }, { "category": "general", "text": "Incorrect Comparison", "title": "CWE-697" }, { "category": "general", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "Missing Authorization", "title": "CWE-862" } ], "publisher": { "category": "coordinator", "contact_details": "cert@ncsc.nl", "name": "Nationaal Cyber Security Centrum", "namespace": "https://www.ncsc.nl/" }, "references": [ { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122375" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122374" }, { "category": "external", "summary": "Reference - cveprojectv5; nvd", "url": "https://support.apple.com/en-us/122373" } ], "title": "Kwetsbaarheden verholpen in Apple macOS", "tracking": { "current_release_date": "2025-04-01T08:41:09.934597Z", "generator": { "date": "2025-02-25T15:15:00Z", "engine": { "name": "V.A.", "version": "1.0" } }, "id": "NCSC-2025-0102", "initial_release_date": "2025-04-01T08:41:09.934597Z", "revision_history": [ { "date": "2025-04-01T08:41:09.934597Z", "number": "1.0.0", "summary": "Initiele versie" } ], "status": "final", "version": "1.0.0" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "vers:apple/13.7", "product": { "name": "vers:apple/13.7", "product_id": "CSAFPID-1251566" } }, { "category": "product_version_range", "name": "vers:unknown/\u003e=13.0|\u003c13.7.3", "product": { "name": "vers:unknown/\u003e=13.0|\u003c13.7.3", "product_id": "CSAFPID-1916435" } }, { "category": "product_version_range", "name": "vers:apple/14.7", "product": { "name": "vers:apple/14.7", "product_id": "CSAFPID-1251568" } }, { "category": "product_version_range", "name": "vers:apple/15.3", "product": { "name": "vers:apple/15.3", "product_id": "CSAFPID-1915328" } } ], "category": "product_name", "name": "macOS" } ], "category": "product_family", "name": "Apple" }, { "branches": [ { "category": "product_version_range", "name": "vers:unknown/13.7", "product": { "name": "vers:unknown/13.7", "product_id": "CSAFPID-1136191" } }, { "category": "product_version_range", "name": "vers:unknown/13.7.1", "product": { "name": "vers:unknown/13.7.1", "product_id": "CSAFPID-1245683", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:13.7.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/13.7.2", "product": { "name": "vers:unknown/13.7.2", "product_id": "CSAFPID-1496144" } }, { "category": "product_version_range", "name": "vers:unknown/13.7.3", "product": { "name": "vers:unknown/13.7.3", "product_id": "CSAFPID-2406261" } }, { "category": "product_version_range", "name": "vers:unknown/ventura \u003c13.7.3", "product": { "name": "vers:unknown/ventura \u003c13.7.3", "product_id": "CSAFPID-1904383" } }, { "category": "product_version_range", "name": "vers:unknown/unspecified|\u003c13.7", "product": { "name": "vers:unknown/unspecified|\u003c13.7", "product_id": "CSAFPID-1416488" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c13.7.3", "product": { "name": "vers:unknown/\u003c13.7.3", "product_id": "CSAFPID-1923307", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/14.7", "product": { "name": "vers:unknown/14.7", "product_id": "CSAFPID-1136190" } }, { "category": "product_version_range", "name": "vers:unknown/14.7.1", "product": { "name": "vers:unknown/14.7.1", "product_id": "CSAFPID-1245685", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:14.7.1:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/14.7.2", "product": { "name": "vers:unknown/14.7.2", "product_id": "CSAFPID-1496142" } }, { "category": "product_version_range", "name": "vers:unknown/14.7.3", "product": { "name": "vers:unknown/14.7.3", "product_id": "CSAFPID-2406265" } }, { "category": "product_version_range", "name": "vers:unknown/\u003c14.7.3", "product": { "name": "vers:unknown/\u003c14.7.3", "product_id": "CSAFPID-1923306", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/sonoma \u003c14.7.3", "product": { "name": "vers:unknown/sonoma \u003c14.7.3", "product_id": "CSAFPID-1904384" } }, { "category": "product_version_range", "name": "vers:unknown/15.0", "product": { "name": "vers:unknown/15.0", "product_id": "CSAFPID-1245684", "product_identification_helper": { "cpe": "cpe:2.3:o:apple:macos:15.0:-:*:*:*:*:*:*" } } }, { "category": "product_version_range", "name": "vers:unknown/15.1", "product": { "name": "vers:unknown/15.1", "product_id": "CSAFPID-1436077" } }, { "category": "product_version_range", "name": "vers:unknown/15.1.1", "product": { "name": "vers:unknown/15.1.1", "product_id": "CSAFPID-1463431" } }, { "category": "product_version_range", "name": "vers:unknown/15.2", "product": { "name": "vers:unknown/15.2", "product_id": "CSAFPID-1904042" } }, { "category": "product_version_range", "name": "vers:unknown/15.3", "product": { "name": "vers:unknown/15.3", "product_id": "CSAFPID-2492950" } }, { "category": "product_version_range", "name": "vers:unknown/unspecified|\u003c15.4", "product": { "name": "vers:unknown/unspecified|\u003c15.4", "product_id": "CSAFPID-2470109" } } ], "category": "product_name", "name": "macOS" }, { "branches": [ { "category": "product_version_range", "name": "vers:apple/13.7.3", "product": { "name": "vers:apple/13.7.3", "product_id": "CSAFPID-1902955" } } ], "category": "product_name", "name": "macOS Ventura" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27043", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2023-27043", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-27043.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2023-27043" }, { "cve": "CVE-2024-9681", "cwe": { "id": "CWE-1025", "name": "Comparison Using Wrong Factors" }, "notes": [ { "category": "other", "text": "Comparison Using Wrong Factors", "title": "CWE-1025" }, { "category": "other", "text": "Incorrect Comparison", "title": "CWE-697" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2024-9681", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9681.json" } ], "scores": [ { "cvss_v3": { "baseScore": 6.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2024-9681" }, { "cve": "CVE-2024-40864", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2024-40864", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-40864.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2024-40864" }, { "cve": "CVE-2024-48958", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2024-48958", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-48958.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2024-48958" }, { "cve": "CVE-2024-54533", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2024-54533", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54533.json" } ], "title": "CVE-2024-54533" }, { "cve": "CVE-2024-56171", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "notes": [ { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2024-56171", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56171.json" } ], "scores": [ { "cvss_v3": { "baseScore": 8.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2024-56171" }, { "cve": "CVE-2025-24085", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" }, { "category": "other", "text": "Use After Free", "title": "CWE-416" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24085", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24085.json" } ], "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24093", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" }, { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24093", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24093.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24093" }, { "cve": "CVE-2025-24097", "cwe": { "id": "CWE-125", "name": "Out-of-bounds Read" }, "notes": [ { "category": "other", "text": "Out-of-bounds Read", "title": "CWE-125" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24097", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24097.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.0, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24097" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24113.json" } ], "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24139", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" }, { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24139", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24139.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24139" }, { "cve": "CVE-2025-24148", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24148", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24148.json" } ], "title": "CVE-2025-24148" }, { "cve": "CVE-2025-24157", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24157", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24157.json" } ], "title": "CVE-2025-24157" }, { "cve": "CVE-2025-24163", "cwe": { "id": "CWE-770", "name": "Allocation of Resources Without Limits or Throttling" }, "notes": [ { "category": "other", "text": "Allocation of Resources Without Limits or Throttling", "title": "CWE-770" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24163", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24163.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24164", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24164", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24164.json" } ], "title": "CVE-2025-24164" }, { "cve": "CVE-2025-24167", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24167", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24167.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24167" }, { "cve": "CVE-2025-24170", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24170", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24170.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24170" }, { "cve": "CVE-2025-24172", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24172", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24172.json" } ], "title": "CVE-2025-24172" }, { "cve": "CVE-2025-24173", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24173", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24173.json" } ], "title": "CVE-2025-24173" }, { "cve": "CVE-2025-24178", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24178", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24178.json" } ], "title": "CVE-2025-24178" }, { "cve": "CVE-2025-24180", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24180", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24180.json" } ], "title": "CVE-2025-24180" }, { "cve": "CVE-2025-24181", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24181", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24181.json" } ], "title": "CVE-2025-24181" }, { "cve": "CVE-2025-24182", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24182.json" } ], "title": "CVE-2025-24182" }, { "cve": "CVE-2025-24190", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24190", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24190.json" } ], "title": "CVE-2025-24190" }, { "cve": "CVE-2025-24191", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24191.json" } ], "title": "CVE-2025-24191" }, { "cve": "CVE-2025-24192", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24192", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24192.json" } ], "title": "CVE-2025-24192" }, { "cve": "CVE-2025-24194", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24194", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24194.json" } ], "title": "CVE-2025-24194" }, { "cve": "CVE-2025-24195", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24195", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24195.json" } ], "title": "CVE-2025-24195" }, { "cve": "CVE-2025-24196", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24196", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24196.json" } ], "title": "CVE-2025-24196" }, { "cve": "CVE-2025-24198", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24198", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24198.json" } ], "title": "CVE-2025-24198" }, { "cve": "CVE-2025-24199", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24199", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24199.json" } ], "title": "CVE-2025-24199" }, { "cve": "CVE-2025-24202", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24202", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24202.json" } ], "title": "CVE-2025-24202" }, { "cve": "CVE-2025-24203", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24203", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24203.json" } ], "title": "CVE-2025-24203" }, { "cve": "CVE-2025-24204", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24204", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24204.json" } ], "title": "CVE-2025-24204" }, { "cve": "CVE-2025-24205", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24205", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24205.json" } ], "title": "CVE-2025-24205" }, { "cve": "CVE-2025-24207", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24207", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24207.json" } ], "title": "CVE-2025-24207" }, { "cve": "CVE-2025-24209", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24209", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24209.json" } ], "title": "CVE-2025-24209" }, { "cve": "CVE-2025-24210", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24210", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24210.json" } ], "title": "CVE-2025-24210" }, { "cve": "CVE-2025-24211", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24211", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24211.json" } ], "title": "CVE-2025-24211" }, { "cve": "CVE-2025-24212", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24212", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24212.json" } ], "title": "CVE-2025-24212" }, { "cve": "CVE-2025-24213", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24213", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24213.json" } ], "title": "CVE-2025-24213" }, { "cve": "CVE-2025-24214", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24214", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24214.json" } ], "title": "CVE-2025-24214" }, { "cve": "CVE-2025-24215", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24215", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24215.json" } ], "title": "CVE-2025-24215" }, { "cve": "CVE-2025-24216", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24216", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24216.json" } ], "title": "CVE-2025-24216" }, { "cve": "CVE-2025-24217", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24217", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24217.json" } ], "title": "CVE-2025-24217" }, { "cve": "CVE-2025-24218", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24218", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24218.json" } ], "title": "CVE-2025-24218" }, { "cve": "CVE-2025-24228", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24228", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24228.json" } ], "title": "CVE-2025-24228" }, { "cve": "CVE-2025-24229", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24229", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24229.json" } ], "title": "CVE-2025-24229" }, { "cve": "CVE-2025-24230", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24230", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24230.json" } ], "title": "CVE-2025-24230" }, { "cve": "CVE-2025-24231", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24231", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24231.json" } ], "title": "CVE-2025-24231" }, { "cve": "CVE-2025-24232", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24232", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24232.json" } ], "title": "CVE-2025-24232" }, { "cve": "CVE-2025-24233", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24233", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24233.json" } ], "title": "CVE-2025-24233" }, { "cve": "CVE-2025-24234", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24234", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24234.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24234" }, { "cve": "CVE-2025-24235", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24235", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24235.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24235" }, { "cve": "CVE-2025-24236", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24236", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24236.json" } ], "title": "CVE-2025-24236" }, { "cve": "CVE-2025-24237", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24237", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24237.json" } ], "title": "CVE-2025-24237" }, { "cve": "CVE-2025-24238", "cwe": { "id": "CWE-276", "name": "Incorrect Default Permissions" }, "notes": [ { "category": "other", "text": "Incorrect Default Permissions", "title": "CWE-276" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24238", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24238.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24238" }, { "cve": "CVE-2025-24239", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24239", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24239.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24239" }, { "cve": "CVE-2025-24240", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24240", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24240.json" } ], "title": "CVE-2025-24240" }, { "cve": "CVE-2025-24241", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24241", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24241.json" } ], "title": "CVE-2025-24241" }, { "cve": "CVE-2025-24242", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24242", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24242.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24242" }, { "cve": "CVE-2025-24243", "cwe": { "id": "CWE-94", "name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)" }, "notes": [ { "category": "other", "text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)", "title": "CWE-94" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24243", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24243.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24243" }, { "cve": "CVE-2025-24244", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24244", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24244.json" } ], "title": "CVE-2025-24244" }, { "cve": "CVE-2025-24245", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24245", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24245.json" } ], "title": "CVE-2025-24245" }, { "cve": "CVE-2025-24246", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24246", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24246.json" } ], "title": "CVE-2025-24246" }, { "cve": "CVE-2025-24247", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24247", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24247.json" } ], "title": "CVE-2025-24247" }, { "cve": "CVE-2025-24248", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24248", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24248.json" } ], "title": "CVE-2025-24248" }, { "cve": "CVE-2025-24249", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24249", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24249.json" } ], "title": "CVE-2025-24249" }, { "cve": "CVE-2025-24250", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24250", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24250.json" } ], "title": "CVE-2025-24250" }, { "cve": "CVE-2025-24253", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24253", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24253.json" } ], "title": "CVE-2025-24253" }, { "cve": "CVE-2025-24254", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24254", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24254.json" } ], "title": "CVE-2025-24254" }, { "cve": "CVE-2025-24255", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24255", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24255.json" } ], "title": "CVE-2025-24255" }, { "cve": "CVE-2025-24256", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24256", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24256.json" } ], "title": "CVE-2025-24256" }, { "cve": "CVE-2025-24257", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24257", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24257.json" } ], "title": "CVE-2025-24257" }, { "cve": "CVE-2025-24259", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "notes": [ { "category": "other", "text": "Missing Authorization", "title": "CWE-862" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24259", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24259.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24259" }, { "cve": "CVE-2025-24260", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24260", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24260.json" } ], "title": "CVE-2025-24260" }, { "cve": "CVE-2025-24261", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24261", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24261.json" } ], "title": "CVE-2025-24261" }, { "cve": "CVE-2025-24262", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24262", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24262.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24262" }, { "cve": "CVE-2025-24263", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24263", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24263.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24263" }, { "cve": "CVE-2025-24264", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24264", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24264.json" } ], "title": "CVE-2025-24264" }, { "cve": "CVE-2025-24265", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24265", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24265.json" } ], "title": "CVE-2025-24265" }, { "cve": "CVE-2025-24266", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24266", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24266.json" } ], "title": "CVE-2025-24266" }, { "cve": "CVE-2025-24267", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24267", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24267.json" } ], "title": "CVE-2025-24267" }, { "cve": "CVE-2025-24269", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24269", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24269.json" } ], "title": "CVE-2025-24269" }, { "cve": "CVE-2025-24272", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24272", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24272.json" } ], "title": "CVE-2025-24272" }, { "cve": "CVE-2025-24273", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24273", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24273.json" } ], "title": "CVE-2025-24273" }, { "cve": "CVE-2025-24276", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24276", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24276.json" } ], "title": "CVE-2025-24276" }, { "cve": "CVE-2025-24277", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24277", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24277.json" } ], "title": "CVE-2025-24277" }, { "cve": "CVE-2025-24278", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24278", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24278.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24278" }, { "cve": "CVE-2025-24279", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24279", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24279.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24279" }, { "cve": "CVE-2025-24280", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24280", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24280.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24280" }, { "cve": "CVE-2025-24281", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24281", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24281.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-24281" }, { "cve": "CVE-2025-24282", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24282", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24282.json" } ], "title": "CVE-2025-24282" }, { "cve": "CVE-2025-24283", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-24283", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-24283.json" } ], "title": "CVE-2025-24283" }, { "cve": "CVE-2025-27113", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "notes": [ { "category": "other", "text": "NULL Pointer Dereference", "title": "CWE-476" }, { "category": "general", "text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-27113", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-27113.json" } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-27113" }, { "cve": "CVE-2025-30424", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30424", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30424.json" } ], "title": "CVE-2025-30424" }, { "cve": "CVE-2025-30425", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30425", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30425.json" } ], "title": "CVE-2025-30425" }, { "cve": "CVE-2025-30426", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30426", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30426.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30426" }, { "cve": "CVE-2025-30427", "cwe": { "id": "CWE-400", "name": "Uncontrolled Resource Consumption" }, "notes": [ { "category": "other", "text": "Uncontrolled Resource Consumption", "title": "CWE-400" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30427", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30427.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30427" }, { "cve": "CVE-2025-30429", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30429", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30429.json" } ], "title": "CVE-2025-30429" }, { "cve": "CVE-2025-30430", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30430", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30430.json" } ], "title": "CVE-2025-30430" }, { "cve": "CVE-2025-30432", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30432", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30432.json" } ], "title": "CVE-2025-30432" }, { "cve": "CVE-2025-30433", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30433", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30433.json" } ], "title": "CVE-2025-30433" }, { "cve": "CVE-2025-30435", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30435", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30435.json" } ], "title": "CVE-2025-30435" }, { "cve": "CVE-2025-30437", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30437", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30437.json" } ], "title": "CVE-2025-30437" }, { "cve": "CVE-2025-30438", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30438", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30438.json" } ], "title": "CVE-2025-30438" }, { "cve": "CVE-2025-30439", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30439", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30439.json" } ], "title": "CVE-2025-30439" }, { "cve": "CVE-2025-30443", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30443", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30443.json" } ], "title": "CVE-2025-30443" }, { "cve": "CVE-2025-30444", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30444", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30444.json" } ], "title": "CVE-2025-30444" }, { "cve": "CVE-2025-30446", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "notes": [ { "category": "other", "text": "Out-of-bounds Write", "title": "CWE-787" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30446", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30446.json" } ], "scores": [ { "cvss_v3": { "baseScore": 9.8, "baseSeverity": "CRITICAL", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30446" }, { "cve": "CVE-2025-30447", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30447", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30447.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30447" }, { "cve": "CVE-2025-30449", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30449", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30449.json" } ], "title": "CVE-2025-30449" }, { "cve": "CVE-2025-30450", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30450", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30450.json" } ], "title": "CVE-2025-30450" }, { "cve": "CVE-2025-30451", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30451", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30451.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30451" }, { "cve": "CVE-2025-30452", "cwe": { "id": "CWE-20", "name": "Improper Input Validation" }, "notes": [ { "category": "other", "text": "Improper Input Validation", "title": "CWE-20" }, { "category": "general", "text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30452", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30452.json" } ], "title": "CVE-2025-30452" }, { "cve": "CVE-2025-30454", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30454", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30454.json" } ], "title": "CVE-2025-30454" }, { "cve": "CVE-2025-30455", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30455", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30455.json" } ], "title": "CVE-2025-30455" }, { "cve": "CVE-2025-30456", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30456", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30456.json" } ], "title": "CVE-2025-30456" }, { "cve": "CVE-2025-30457", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30457", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30457.json" } ], "title": "CVE-2025-30457" }, { "cve": "CVE-2025-30458", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30458", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30458.json" } ], "title": "CVE-2025-30458" }, { "cve": "CVE-2025-30460", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30460", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30460.json" } ], "title": "CVE-2025-30460" }, { "cve": "CVE-2025-30461", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30461", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30461.json" } ], "title": "CVE-2025-30461" }, { "cve": "CVE-2025-30462", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30462", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30462.json" } ], "title": "CVE-2025-30462" }, { "cve": "CVE-2025-30463", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30463", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30463.json" } ], "title": "CVE-2025-30463" }, { "cve": "CVE-2025-30464", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30464", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30464.json" } ], "title": "CVE-2025-30464" }, { "cve": "CVE-2025-30465", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30465", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30465.json" } ], "title": "CVE-2025-30465" }, { "cve": "CVE-2025-30467", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30467", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30467.json" } ], "title": "CVE-2025-30467" }, { "cve": "CVE-2025-30470", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30470", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30470.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-30470" }, { "cve": "CVE-2025-30471", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-30471", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-30471.json" } ], "title": "CVE-2025-30471" }, { "cve": "CVE-2025-31182", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31182", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31182.json" } ], "title": "CVE-2025-31182" }, { "cve": "CVE-2025-31183", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31183", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31183.json" } ], "title": "CVE-2025-31183" }, { "cve": "CVE-2025-31184", "cwe": { "id": "CWE-275", "name": "-" }, "notes": [ { "category": "other", "text": "CWE-275", "title": "CWE-275" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31184", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31184.json" } ], "title": "CVE-2025-31184" }, { "cve": "CVE-2025-31187", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "notes": [ { "category": "other", "text": "Improper Access Control", "title": "CWE-284" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31187", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31187.json" } ], "title": "CVE-2025-31187" }, { "cve": "CVE-2025-31188", "cwe": { "id": "CWE-362", "name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)" }, "notes": [ { "category": "other", "text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)", "title": "CWE-362" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31188", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31188.json" } ], "title": "CVE-2025-31188" }, { "cve": "CVE-2025-31191", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "notes": [ { "category": "other", "text": "Exposure of Sensitive Information to an Unauthorized Actor", "title": "CWE-200" }, { "category": "general", "text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "title": "CVSSV4" } ], "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31191", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31191.json" } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] } ], "title": "CVE-2025-31191" }, { "cve": "CVE-2025-31192", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31192", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31192.json" } ], "title": "CVE-2025-31192" }, { "cve": "CVE-2025-31194", "product_status": { "known_affected": [ "CSAFPID-1251566", "CSAFPID-1136191", "CSAFPID-1245683", "CSAFPID-1496144", "CSAFPID-2406261", "CSAFPID-1902955", "CSAFPID-1904383", "CSAFPID-1416488", "CSAFPID-1916435", "CSAFPID-1923307", "CSAFPID-1251568", "CSAFPID-1136190", "CSAFPID-1245685", "CSAFPID-1496142", "CSAFPID-2406265", "CSAFPID-1923306", "CSAFPID-1904384", "CSAFPID-1915328", "CSAFPID-1245684", "CSAFPID-1436077", "CSAFPID-1463431", "CSAFPID-1904042", "CSAFPID-2492950", "CSAFPID-2470109" ] }, "references": [ { "category": "self", "summary": "CVE-2025-31194", "url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-31194.json" } ], "title": "CVE-2025-31194" } ] }
fkie_cve-2025-24264
Vulnerability from fkie_nvd
URL | Tags | ||
---|---|---|---|
product-security@apple.com | https://support.apple.com/en-us/122371 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/122372 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/122373 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/122377 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/122378 | Vendor Advisory | |
product-security@apple.com | https://support.apple.com/en-us/122379 | Vendor Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "matchCriteriaId": "45D15738-9AE3-4CB5-8755-A67F6E09EAC5", "versionEndExcluding": "18.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "687E67E4-136D-4154-BA6F-5ACA16254023", "versionEndExcluding": "17.7.6", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAAF5169-C6A9-449A-B41F-2CB1801EBA4B", "versionEndExcluding": "18.4", "versionStartIncluding": "18.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "matchCriteriaId": "0D9C73F9-FEF4-4FC1-B83D-56566AD35990", "versionEndExcluding": "18.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "matchCriteriaId": "1320B815-0457-4276-83B9-AFAFDAF17EDA", "versionEndExcluding": "15.4", "versionStartIncluding": "15.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C61CCC2-87D3-4A3A-837B-63C48299A7AD", "versionEndExcluding": "18.4", "vulnerable": true }, { "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", "matchCriteriaId": "E82603D7-A630-4B9B-9C51-880667F05EC7", "versionEndExcluding": "2.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash." }, { "lang": "es", "value": "El problema se solucion\u00f3 mejorando la gesti\u00f3n de la memoria. Este problema est\u00e1 corregido en visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 y iPadOS 18.4, macOS Sequoia 15.4 y Safari 18.4. El procesamiento de contenido web malintencionado puede provocar un bloqueo inesperado de Safari." } ], "id": "CVE-2025-24264", "lastModified": "2025-04-04T19:00:46.457", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2025-03-31T23:15:23.337", "references": [ { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122371" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122372" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122373" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122377" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122378" }, { "source": "product-security@apple.com", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/122379" } ], "sourceIdentifier": "product-security@apple.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
wid-sec-w-2025-0668
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, um erh\u00f6hte Rechte - sogar Root-Rechte - zu erlangen, um vertrauliche Informationen offenzulegen, um beliebigen Code auszuf\u00fchren, um Daten zu manipulieren, um Sicherheitsma\u00dfnahmen - sogar Sandbox-Einschr\u00e4nkungen - zu umgehen oder um einen Denial-of-Service-Zustand auszul\u00f6sen.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0668 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0668.json" }, { "category": "self", "summary": "WID-SEC-2025-0668 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0668" }, { "category": "external", "summary": "About the security content of macOS Ventura 13.7.5 vom 2025-03-31", "url": "https://support.apple.com/en-us/122375" }, { "category": "external", "summary": "About the security content of macOS Sonoma 14.7.5 vom 2025-03-31", "url": "https://support.apple.com/en-us/122374" }, { "category": "external", "summary": "About the security content of macOS Sequoia 15.4 vom 2025-03-31", "url": "https://support.apple.com/en-us/122373" }, { "category": "external", "summary": "KEV Catalog CVE-2025-24085 vom 2025-01-29", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-24085\u0026field_date_added_wrapper=all\u0026field_cve=\u0026sort_by=field_date_added\u0026items_per_page=20\u0026url" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:20257-1 vom 2025-06-04", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021061.html" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-08-11T22:00:00.000+00:00", "generator": { "date": "2025-08-12T06:52:11.328+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0668", "initial_release_date": "2025-03-31T22:00:00.000+00:00", "revision_history": [ { "date": "2025-03-31T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-28T22:00:00.000+00:00", "number": "2", "summary": "CVE\u0027s erg\u00e4nzt" }, { "date": "2025-06-03T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-06-11T22:00:00.000+00:00", "number": "4", "summary": "CVE-Nummern erg\u00e4nzt" }, { "date": "2025-08-11T22:00:00.000+00:00", "number": "5", "summary": "CVE-2025-43205 erg\u00e4nzt" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version_range", "name": "Ventura \u003c13.7.5", "product": { "name": "Apple macOS Ventura \u003c13.7.5", "product_id": "T042238" } }, { "category": "product_version", "name": "Ventura 13.7.5", "product": { "name": "Apple macOS Ventura 13.7.5", "product_id": "T042238-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:ventura__13.7.5" } } }, { "category": "product_version_range", "name": "Sonoma \u003c14.7.5", "product": { "name": "Apple macOS Sonoma \u003c14.7.5", "product_id": "T042239" } }, { "category": "product_version", "name": "Sonoma 14.7.5", "product": { "name": "Apple macOS Sonoma 14.7.5", "product_id": "T042239-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sonoma__14.7.5" } } }, { "category": "product_version_range", "name": "Sequoia \u003c15.4", "product": { "name": "Apple macOS Sequoia \u003c15.4", "product_id": "T042240" } }, { "category": "product_version", "name": "Sequoia 15.4", "product": { "name": "Apple macOS Sequoia 15.4", "product_id": "T042240-fixed", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:sequoia__15.4" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-27043", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2023-27043" }, { "cve": "CVE-2024-40864", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2024-40864" }, { "cve": "CVE-2024-48958", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2024-48958" }, { "cve": "CVE-2024-54533", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2024-54533" }, { "cve": "CVE-2024-56171", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2024-56171" }, { "cve": "CVE-2024-9681", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2024-9681" }, { "cve": "CVE-2025-24085", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24085" }, { "cve": "CVE-2025-24093", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24093" }, { "cve": "CVE-2025-24097", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24097" }, { "cve": "CVE-2025-24113", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24113" }, { "cve": "CVE-2025-24139", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24139" }, { "cve": "CVE-2025-24148", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24148" }, { "cve": "CVE-2025-24157", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24157" }, { "cve": "CVE-2025-24163", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24163" }, { "cve": "CVE-2025-24164", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24164" }, { "cve": "CVE-2025-24167", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24167" }, { "cve": "CVE-2025-24170", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24170" }, { "cve": "CVE-2025-24172", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24172" }, { "cve": "CVE-2025-24173", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24173" }, { "cve": "CVE-2025-24178", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24178" }, { "cve": "CVE-2025-24180", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24180" }, { "cve": "CVE-2025-24181", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24181" }, { "cve": "CVE-2025-24182", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24182" }, { "cve": "CVE-2025-24190", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24190" }, { "cve": "CVE-2025-24191", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24191" }, { "cve": "CVE-2025-24192", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24192" }, { "cve": "CVE-2025-24194", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24194" }, { "cve": "CVE-2025-24195", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24195" }, { "cve": "CVE-2025-24196", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24196" }, { "cve": "CVE-2025-24198", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24198" }, { "cve": "CVE-2025-24199", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24199" }, { "cve": "CVE-2025-24202", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24202" }, { "cve": "CVE-2025-24203", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24203" }, { "cve": "CVE-2025-24204", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24204" }, { "cve": "CVE-2025-24205", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24205" }, { "cve": "CVE-2025-24207", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24207" }, { "cve": "CVE-2025-24209", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24209" }, { "cve": "CVE-2025-24210", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24210" }, { "cve": "CVE-2025-24211", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24211" }, { "cve": "CVE-2025-24212", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24212" }, { "cve": "CVE-2025-24213", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24213" }, { "cve": "CVE-2025-24214", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24214" }, { "cve": "CVE-2025-24215", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24215" }, { "cve": "CVE-2025-24216", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24216" }, { "cve": "CVE-2025-24217", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24217" }, { "cve": "CVE-2025-24218", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24218" }, { "cve": "CVE-2025-24228", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24228" }, { "cve": "CVE-2025-24229", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24229" }, { "cve": "CVE-2025-24230", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24230" }, { "cve": "CVE-2025-24231", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24231" }, { "cve": "CVE-2025-24232", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24232" }, { "cve": "CVE-2025-24233", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24233" }, { "cve": "CVE-2025-24234", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24234" }, { "cve": "CVE-2025-24235", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24235" }, { "cve": "CVE-2025-24236", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24236" }, { "cve": "CVE-2025-24237", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24237" }, { "cve": "CVE-2025-24238", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24238" }, { "cve": "CVE-2025-24239", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24239" }, { "cve": "CVE-2025-24240", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24240" }, { "cve": "CVE-2025-24241", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24241" }, { "cve": "CVE-2025-24242", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24242" }, { "cve": "CVE-2025-24243", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24243" }, { "cve": "CVE-2025-24244", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24244" }, { "cve": "CVE-2025-24245", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24245" }, { "cve": "CVE-2025-24246", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24246" }, { "cve": "CVE-2025-24247", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24247" }, { "cve": "CVE-2025-24248", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24248" }, { "cve": "CVE-2025-24249", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24249" }, { "cve": "CVE-2025-24250", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24250" }, { "cve": "CVE-2025-24251", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24251" }, { "cve": "CVE-2025-24253", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24253" }, { "cve": "CVE-2025-24254", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24254" }, { "cve": "CVE-2025-24255", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24255" }, { "cve": "CVE-2025-24256", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24256" }, { "cve": "CVE-2025-24257", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24257" }, { "cve": "CVE-2025-24259", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24259" }, { "cve": "CVE-2025-24260", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24260" }, { "cve": "CVE-2025-24261", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24261" }, { "cve": "CVE-2025-24262", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24262" }, { "cve": "CVE-2025-24263", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24263" }, { "cve": "CVE-2025-24264", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24264" }, { "cve": "CVE-2025-24265", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24265" }, { "cve": "CVE-2025-24266", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24266" }, { "cve": "CVE-2025-24267", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24267" }, { "cve": "CVE-2025-24269", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24269" }, { "cve": "CVE-2025-24270", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24270" }, { "cve": "CVE-2025-24272", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24272" }, { "cve": "CVE-2025-24273", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24273" }, { "cve": "CVE-2025-24276", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24276" }, { "cve": "CVE-2025-24277", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24277" }, { "cve": "CVE-2025-24278", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24278" }, { "cve": "CVE-2025-24279", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24279" }, { "cve": "CVE-2025-24280", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24280" }, { "cve": "CVE-2025-24281", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24281" }, { "cve": "CVE-2025-24282", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24282" }, { "cve": "CVE-2025-24283", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-24283" }, { "cve": "CVE-2025-27113", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-27113" }, { "cve": "CVE-2025-30424", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30424" }, { "cve": "CVE-2025-30425", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30425" }, { "cve": "CVE-2025-30426", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30426" }, { "cve": "CVE-2025-30427", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30427" }, { "cve": "CVE-2025-30429", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30429" }, { "cve": "CVE-2025-30430", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30430" }, { "cve": "CVE-2025-30432", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30432" }, { "cve": "CVE-2025-30433", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30433" }, { "cve": "CVE-2025-30435", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30435" }, { "cve": "CVE-2025-30437", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30437" }, { "cve": "CVE-2025-30438", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30438" }, { "cve": "CVE-2025-30439", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30439" }, { "cve": "CVE-2025-30443", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30443" }, { "cve": "CVE-2025-30444", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30444" }, { "cve": "CVE-2025-30445", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30445" }, { "cve": "CVE-2025-30446", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30446" }, { "cve": "CVE-2025-30447", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30447" }, { "cve": "CVE-2025-30449", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30449" }, { "cve": "CVE-2025-30450", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30450" }, { "cve": "CVE-2025-30451", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30451" }, { "cve": "CVE-2025-30452", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30452" }, { "cve": "CVE-2025-30454", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30454" }, { "cve": "CVE-2025-30455", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30455" }, { "cve": "CVE-2025-30456", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30456" }, { "cve": "CVE-2025-30457", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30457" }, { "cve": "CVE-2025-30458", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30458" }, { "cve": "CVE-2025-30460", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30460" }, { "cve": "CVE-2025-30461", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30461" }, { "cve": "CVE-2025-30462", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30462" }, { "cve": "CVE-2025-30463", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30463" }, { "cve": "CVE-2025-30464", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30464" }, { "cve": "CVE-2025-30465", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30465" }, { "cve": "CVE-2025-30466", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30466" }, { "cve": "CVE-2025-30467", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30467" }, { "cve": "CVE-2025-30470", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30470" }, { "cve": "CVE-2025-30471", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-30471" }, { "cve": "CVE-2025-31182", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31182" }, { "cve": "CVE-2025-31183", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31183" }, { "cve": "CVE-2025-31184", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31184" }, { "cve": "CVE-2025-31187", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31187" }, { "cve": "CVE-2025-31188", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31188" }, { "cve": "CVE-2025-31189", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31189" }, { "cve": "CVE-2025-31191", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31191" }, { "cve": "CVE-2025-31192", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31192" }, { "cve": "CVE-2025-31194", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31194" }, { "cve": "CVE-2025-31195", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31195" }, { "cve": "CVE-2025-31197", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31197" }, { "cve": "CVE-2025-31198", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31198" }, { "cve": "CVE-2025-31199", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31199" }, { "cve": "CVE-2025-31202", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31202" }, { "cve": "CVE-2025-31203", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31203" }, { "cve": "CVE-2025-31231", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31231" }, { "cve": "CVE-2025-31261", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31261" }, { "cve": "CVE-2025-31263", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31263" }, { "cve": "CVE-2025-31264", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-31264" }, { "cve": "CVE-2025-43205", "product_status": { "known_affected": [ "T002207", "T042238", "T042239", "T042240" ] }, "release_date": "2025-03-31T22:00:00.000+00:00", "title": "CVE-2025-43205" } ] }
wid-sec-w-2025-0728
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "WebKit ist die Webbrowser-Engine, die von Safari und vielen anderen Apps auf macOS, iOS und Linux verwendet wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer oder lokaler Angreifer kann mehrere Schwachstellen in WebKit ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, einen Denial-of-Service-Zustand herbeizuf\u00fchren oder nicht spezifizierte Auswirkungen zu verursachen.", "title": "Angriff" }, { "category": "general", "text": "- Sonstiges\n- UNIX", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2025-0728 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0728.json" }, { "category": "self", "summary": "WID-SEC-2025-0728 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0728" }, { "category": "external", "summary": "WebKit Security Advisory vom 2025-04-07", "url": "https://webkitgtk.org/security/WSA-2025-0003.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3713 vom 2025-04-09", "url": "https://access.redhat.com/errata/RHSA-2025:3713" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3755 vom 2025-04-09", "url": "https://access.redhat.com/errata/RHSA-2025:3755" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3713 vom 2025-04-09", "url": "https://linux.oracle.com/errata/ELSA-2025-3713.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3756 vom 2025-04-09", "url": "https://access.redhat.com/errata/RHSA-2025:3756" }, { "category": "external", "summary": "Debian Security Advisory DSA-5899 vom 2025-04-10", "url": "https://lists.debian.org/debian-security-announce/2025/msg00061.html" }, { "category": "external", "summary": "Ubuntu Security Notice USN-7436-1 vom 2025-04-14", "url": "https://ubuntu.com/security/notices/USN-7436-1" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1265-1 vom 2025-04-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020705.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1331-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020721.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1325-1 vom 2025-04-16", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020718.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:1336-1 vom 2025-04-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-April/020729.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-3974 vom 2025-04-18", "url": "http://linux.oracle.com/errata/ELSA-2025-3974.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:3974 vom 2025-04-18", "url": "https://access.redhat.com/errata/RHSA-2025:3974.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:4445 vom 2025-05-05", "url": "https://access.redhat.com/errata/RHSA-2025:4445" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7387 vom 2025-05-13", "url": "https://access.redhat.com/errata/RHSA-2025:7387" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:7998 vom 2025-05-19", "url": "https://access.redhat.com/errata/RHSA-2025:7998" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8065 vom 2025-05-21", "url": "https://access.redhat.com/errata/RHSA-2025:8065" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-7387 vom 2025-05-22", "url": "https://linux.oracle.com/errata/ELSA-2025-7387.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:8194 vom 2025-05-27", "url": "https://access.redhat.com/errata/RHSA-2025:8194" }, { "category": "external", "summary": "Debian Security Advisory DLA-4218 vom 2025-06-16", "url": "https://lists.debian.org/debian-lts-announce/2025/06/msg00016.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2025:10364 vom 2025-07-07", "url": "https://access.redhat.com/errata/RHSA-2025:10364" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:7387 vom 2025-07-29", "url": "https://errata.build.resf.org/RLSA-2025:7387" }, { "category": "external", "summary": "Rocky Linux Security Advisory RLSA-2025:3713 vom 2025-07-29", "url": "https://errata.build.resf.org/RLSA-2025:3713" } ], "source_lang": "en-US", "title": "WebKitGTK und WPE WebKit: Mehrere Schwachstellen", "tracking": { "current_release_date": "2025-07-29T22:00:00.000+00:00", "generator": { "date": "2025-07-30T08:49:36.949+00:00", "engine": { "name": "BSI-WID", "version": "1.4.0" } }, "id": "WID-SEC-W-2025-0728", "initial_release_date": "2025-04-07T22:00:00.000+00:00", "revision_history": [ { "date": "2025-04-07T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2025-04-08T22:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-04-09T22:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2025-04-10T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-04-14T22:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Ubuntu aufgenommen" }, { "date": "2025-04-15T22:00:00.000+00:00", "number": "6", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-16T22:00:00.000+00:00", "number": "7", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-04-21T22:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE, Oracle Linux und Red Hat aufgenommen" }, { "date": "2025-05-04T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-13T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-19T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-20T22:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-05-21T22:00:00.000+00:00", "number": "13", "summary": "Produktzuordnung \u00fcberarbeitet" }, { "date": "2025-05-22T22:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-05-26T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-06-16T22:00:00.000+00:00", "number": "16", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-07-06T22:00:00.000+00:00", "number": "17", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2025-07-29T22:00:00.000+00:00", "number": "18", "summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen" } ], "status": "final", "version": "18" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "branches": [ { "category": "product_version_range", "name": "\u003c2.48.1", "product": { "name": "Open Source WebKitGTK \u003c2.48.1", "product_id": "T044046" } }, { "category": "product_version", "name": "2.48.1", "product": { "name": "Open Source WebKitGTK 2.48.1", "product_id": "T044046-fixed", "product_identification_helper": { "cpe": "cpe:/a:webkitgtk:webkitgtk:2.48.1" } } } ], "category": "product_name", "name": "WebKitGTK" } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "RESF Rocky Linux", "product": { "name": "RESF Rocky Linux", "product_id": "T032255", "product_identification_helper": { "cpe": "cpe:/o:resf:rocky_linux:-" } } } ], "category": "vendor", "name": "RESF" }, { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "branches": [ { "category": "product_version", "name": "Dev Spaces 3", "product": { "name": "Red Hat OpenShift Dev Spaces 3", "product_id": "T043942", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:dev_spaces_3" } } } ], "category": "product_name", "name": "OpenShift" } ], "category": "vendor", "name": "Red Hat" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" }, { "branches": [ { "category": "product_name", "name": "Ubuntu Linux", "product": { "name": "Ubuntu Linux", "product_id": "T042769", "product_identification_helper": { "cpe": "cpe:/o:canonical:ubuntu_linux:-" } } } ], "category": "vendor", "name": "Ubuntu" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-24208", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-24208" }, { "cve": "CVE-2025-24213", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-24213" }, { "cve": "CVE-2024-54551", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2024-54551" }, { "cve": "CVE-2025-24209", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-24209" }, { "cve": "CVE-2025-24216", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-24216" }, { "cve": "CVE-2025-24264", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-24264" }, { "cve": "CVE-2025-30427", "product_status": { "known_affected": [ "2951", "T002207", "T043942", "67646", "T042769", "T004914", "T032255", "T044046" ] }, "release_date": "2025-04-07T22:00:00.000+00:00", "title": "CVE-2025-30427" } ] }
ghsa-7hxq-4w6w-xgc9
Vulnerability from github
The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.
{ "affected": [], "aliases": [ "CVE-2025-24264" ], "database_specific": { "cwe_ids": [ "CWE-400" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-03-31T23:15:23Z", "severity": "CRITICAL" }, "details": "The issue was addressed with improved memory handling. This issue is fixed in visionOS 2.4, tvOS 18.4, iPadOS 17.7.6, iOS 18.4 and iPadOS 18.4, macOS Sequoia 15.4, Safari 18.4. Processing maliciously crafted web content may lead to an unexpected Safari crash.", "id": "GHSA-7hxq-4w6w-xgc9", "modified": "2025-04-01T15:31:31Z", "published": "2025-04-01T00:30:40Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24264" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122371" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122372" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122373" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122377" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122378" }, { "type": "WEB", "url": "https://support.apple.com/en-us/122379" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.