Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-30984 (GCVE-0-2021-30984)
Vulnerability from cvelistv5 – Published: 2021-08-24 18:51 – Updated: 2024-08-03 22:48- Processing maliciously crafted web content may lead to arbitrary code execution
| URL | Tags |
|---|---|
| https://support.apple.com/en-us/HT212975 | x_refsource_MISC |
| https://support.apple.com/en-us/HT212976 | x_refsource_MISC |
| https://support.apple.com/en-us/HT212978 | x_refsource_MISC |
| https://support.apple.com/en-us/HT212980 | x_refsource_MISC |
| https://support.apple.com/en-us/HT212982 | x_refsource_MISC |
| http://www.openwall.com/lists/oss-security/2022/01/21/2 | mailing-listx_refsource_MLIST |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
| https://www.debian.org/security/2022/dsa-5061 | vendor-advisoryx_refsource_DEBIAN |
| https://www.debian.org/security/2022/dsa-5060 | vendor-advisoryx_refsource_DEBIAN |
| https://lists.fedoraproject.org/archives/list/pac… | vendor-advisoryx_refsource_FEDORA |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:48:14.319Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT212975"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT212976"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT212978"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT212980"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://support.apple.com/en-us/HT212982"
},
{
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"name": "FEDORA-2022-25a98f5d55",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"name": "DSA-5061",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"name": "DSA-5060",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"name": "FEDORA-2022-f7366e60cb",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "watchOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "8.3",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "iOS and iPadOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "12.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "macOS",
"vendor": "Apple",
"versions": [
{
"lessThan": "15.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Processing maliciously crafted web content may lead to arbitrary code execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-06T03:06:31.000Z",
"orgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"shortName": "apple"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT212975"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT212976"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT212978"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT212980"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://support.apple.com/en-us/HT212982"
},
{
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"name": "FEDORA-2022-25a98f5d55",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"name": "DSA-5061",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"name": "DSA-5060",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"name": "FEDORA-2022-f7366e60cb",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2021-30984",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "8.3"
}
]
}
},
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "12.1"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing maliciously crafted web content may lead to arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT212975",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"name": "https://support.apple.com/en-us/HT212976",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"name": "https://support.apple.com/en-us/HT212978",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"name": "https://support.apple.com/en-us/HT212980",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212980"
},
{
"name": "https://support.apple.com/en-us/HT212982",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212982"
},
{
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"name": "FEDORA-2022-25a98f5d55",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"name": "DSA-5061",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"name": "DSA-5060",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"name": "FEDORA-2022-f7366e60cb",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c",
"assignerShortName": "apple",
"cveId": "CVE-2021-30984",
"datePublished": "2021-08-24T18:51:22.000Z",
"dateReserved": "2021-04-13T00:00:00.000Z",
"dateUpdated": "2024-08-03T22:48:14.319Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-30984",
"date": "2026-05-19",
"epss": "0.00747",
"percentile": "0.7329"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.2\", \"matchCriteriaId\": \"7B60AA98-68B6-4770-884B-36AE7826E729\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.2\", \"matchCriteriaId\": \"CCE4E546-A0DD-4E9E-A6B9-C19B04D77466\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.2\", \"matchCriteriaId\": \"7FB904C1-43D1-4583-8729-5D1B1746A54C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"12.1\", \"matchCriteriaId\": \"88111C46-3A34-4814-B892-71EB5A9B6743\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"15.2\", \"matchCriteriaId\": \"16CAE2FB-FADC-4BF4-9115-D20D365051BF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.3\", \"matchCriteriaId\": \"7A7245FB-6FBE-4C09-80F5-18504CA623B3\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.\"}, {\"lang\": \"es\", \"value\": \"Se solucion\\u00f3 una condici\\u00f3n de carrera con un manejo de estado mejorado.\u0026#xa0;Este problema se solucion\\u00f3 en tvOS versi\\u00f3n 15.2, macOS Monterey versi\\u00f3n 12.1, Safari versi\\u00f3n 15.2, iOS versi\\u00f3n 15.2 e iPadOS versi\\u00f3n 15.2, watchOS versi\\u00f3n 8.3.\u0026#xa0;El procesamiento de contenido web creado con fines maliciosos puede conllevar a una ejecuci\\u00f3n de c\\u00f3digo arbitrario\"}]",
"id": "CVE-2021-30984",
"lastModified": "2024-11-21T06:05:05.953",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:H/Au:N/C:P/I:P/A:P\", \"baseScore\": 5.1, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"HIGH\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 4.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-08-24T19:15:23.543",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/21/2\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://support.apple.com/en-us/HT212975\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://support.apple.com/en-us/HT212976\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://support.apple.com/en-us/HT212978\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://support.apple.com/en-us/HT212980\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://support.apple.com/en-us/HT212982\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5060\", \"source\": \"product-security@apple.com\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5061\", \"source\": \"product-security@apple.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2022/01/21/2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/en-us/HT212975\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/en-us/HT212976\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/en-us/HT212978\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/en-us/HT212980\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://support.apple.com/en-us/HT212982\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5060\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.debian.org/security/2022/dsa-5061\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-362\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-30984\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2021-08-24T19:15:23.543\",\"lastModified\":\"2024-11-21T06:05:05.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se solucion\u00f3 una condici\u00f3n de carrera con un manejo de estado mejorado.\u0026#xa0;Este problema se solucion\u00f3 en tvOS versi\u00f3n 15.2, macOS Monterey versi\u00f3n 12.1, Safari versi\u00f3n 15.2, iOS versi\u00f3n 15.2 e iPadOS versi\u00f3n 15.2, watchOS versi\u00f3n 8.3.\u0026#xa0;El procesamiento de contenido web creado con fines maliciosos puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:H/Au:N/C:P/I:P/A:P\",\"baseScore\":5.1,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"HIGH\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":4.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-362\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.2\",\"matchCriteriaId\":\"7B60AA98-68B6-4770-884B-36AE7826E729\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.2\",\"matchCriteriaId\":\"CCE4E546-A0DD-4E9E-A6B9-C19B04D77466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.2\",\"matchCriteriaId\":\"7FB904C1-43D1-4583-8729-5D1B1746A54C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"12.1\",\"matchCriteriaId\":\"88111C46-3A34-4814-B892-71EB5A9B6743\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.2\",\"matchCriteriaId\":\"16CAE2FB-FADC-4BF4-9115-D20D365051BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.3\",\"matchCriteriaId\":\"7A7245FB-6FBE-4C09-80F5-18504CA623B3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80E516C0-98A4-4ADE-B69F-66A772E2BAAA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B237A9-69A3-4A9C-9DA0-4E06BD37AE73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6FEEC2-9F11-4643-8827-749718254FED\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/21/2\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT212975\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT212976\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT212978\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT212980\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://support.apple.com/en-us/HT212982\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5060\",\"source\":\"product-security@apple.com\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5061\",\"source\":\"product-security@apple.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2022/01/21/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT212975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT212976\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT212978\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT212980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://support.apple.com/en-us/HT212982\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.debian.org/security/2022/dsa-5061\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2021-AVI-945
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions 8.x antérieures à 8.3 | ||
| Apple | N/A | iOS et iPadOS versions 15.x antérieures à 15.2 | ||
| Apple | macOS | macOS Monterey versions 12.x antérieures à 12.1 | ||
| Apple | macOS | macOS Big Sur versions 11.6.x antérieures à 11.6.2 | ||
| Apple | macOS | macOS Catalina versions antérieures à la mise à jour 2021-008 | ||
| Apple | N/A | tvOS versions 15.x antérieures à 15.2 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions 8.x ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions 15.x ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions 12.x ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions 11.6.x ant\u00e9rieures \u00e0 11.6.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Catalina versions ant\u00e9rieures \u00e0 la mise \u00e0 jour 2021-008",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions 15.x ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30993",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30993"
},
{
"name": "CVE-2021-30983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30983"
},
{
"name": "CVE-2021-30971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30971"
},
{
"name": "CVE-2021-30964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30964"
},
{
"name": "CVE-2021-30957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30957"
},
{
"name": "CVE-2021-30981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30981"
},
{
"name": "CVE-2021-30939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30939"
},
{
"name": "CVE-2021-30948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30948"
},
{
"name": "CVE-2021-30767",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30767"
},
{
"name": "CVE-2021-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30987"
},
{
"name": "CVE-2021-30992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30992"
},
{
"name": "CVE-2021-30969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30969"
},
{
"name": "CVE-2021-30963",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30963"
},
{
"name": "CVE-2021-30967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30967"
},
{
"name": "CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"name": "CVE-2021-30986",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30986"
},
{
"name": "CVE-2021-30916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30916"
},
{
"name": "CVE-2021-30950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30950"
},
{
"name": "CVE-2021-30976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30976"
},
{
"name": "CVE-2021-30965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30965"
},
{
"name": "CVE-2021-30966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30966"
},
{
"name": "CVE-2021-30982",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30982"
},
{
"name": "CVE-2021-30941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30941"
},
{
"name": "CVE-2021-30985",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30985"
},
{
"name": "CVE-2021-30958",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30958"
},
{
"name": "CVE-2021-30931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30931"
},
{
"name": "CVE-2021-30960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30960"
},
{
"name": "CVE-2021-30968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30968"
},
{
"name": "CVE-2021-30945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30945"
},
{
"name": "CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"name": "CVE-2021-30947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30947"
},
{
"name": "CVE-2021-30932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30932"
},
{
"name": "CVE-2021-30979",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30979"
},
{
"name": "CVE-2021-30980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30980"
},
{
"name": "CVE-2021-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30973"
},
{
"name": "CVE-2021-30970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30970"
},
{
"name": "CVE-2021-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30996"
},
{
"name": "CVE-2021-30940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30940"
},
{
"name": "CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"name": "CVE-2021-30977",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30977"
},
{
"name": "CVE-2021-30942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30942"
},
{
"name": "CVE-2021-30990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30990"
},
{
"name": "CVE-2021-30929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30929"
},
{
"name": "CVE-2021-30937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30937"
},
{
"name": "CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"name": "CVE-2021-30975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30975"
},
{
"name": "CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"name": "CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"name": "CVE-2021-30949",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30949"
},
{
"name": "CVE-2021-30926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30926"
},
{
"name": "CVE-2021-30946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30946"
},
{
"name": "CVE-2021-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30991"
},
{
"name": "CVE-2021-30935",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30935"
},
{
"name": "CVE-2021-30938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30938"
},
{
"name": "CVE-2021-30955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30955"
},
{
"name": "CVE-2021-30927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30927"
},
{
"name": "CVE-2021-30988",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30988"
},
{
"name": "CVE-2021-30959",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30959"
},
{
"name": "CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"name": "CVE-2021-30995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30995"
},
{
"name": "CVE-2021-30961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30961"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-945",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212979 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212979"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212981 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212981"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212976 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212975 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212978 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212980 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212980"
}
]
}
CERTFR-2021-AVI-956
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Apple Safari. Elles permettent à un attaquant de provoquer une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Safari versions ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"name": "CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"name": "CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"name": "CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"name": "CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"name": "CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"name": "CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple Safari. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212982 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212982"
}
]
}
CERTFR-2021-AVI-945
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | N/A | watchOS versions 8.x antérieures à 8.3 | ||
| Apple | N/A | iOS et iPadOS versions 15.x antérieures à 15.2 | ||
| Apple | macOS | macOS Monterey versions 12.x antérieures à 12.1 | ||
| Apple | macOS | macOS Big Sur versions 11.6.x antérieures à 11.6.2 | ||
| Apple | macOS | macOS Catalina versions antérieures à la mise à jour 2021-008 | ||
| Apple | N/A | tvOS versions 15.x antérieures à 15.2 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "watchOS versions 8.x ant\u00e9rieures \u00e0 8.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS et iPadOS versions 15.x ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Monterey versions 12.x ant\u00e9rieures \u00e0 12.1",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Big Sur versions 11.6.x ant\u00e9rieures \u00e0 11.6.2",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Catalina versions ant\u00e9rieures \u00e0 la mise \u00e0 jour 2021-008",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions 15.x ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30993",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30993"
},
{
"name": "CVE-2021-30983",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30983"
},
{
"name": "CVE-2021-30971",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30971"
},
{
"name": "CVE-2021-30964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30964"
},
{
"name": "CVE-2021-30957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30957"
},
{
"name": "CVE-2021-30981",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30981"
},
{
"name": "CVE-2021-30939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30939"
},
{
"name": "CVE-2021-30948",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30948"
},
{
"name": "CVE-2021-30767",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30767"
},
{
"name": "CVE-2021-30987",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30987"
},
{
"name": "CVE-2021-30992",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30992"
},
{
"name": "CVE-2021-30969",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30969"
},
{
"name": "CVE-2021-30963",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30963"
},
{
"name": "CVE-2021-30967",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30967"
},
{
"name": "CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"name": "CVE-2021-30986",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30986"
},
{
"name": "CVE-2021-30916",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30916"
},
{
"name": "CVE-2021-30950",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30950"
},
{
"name": "CVE-2021-30976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30976"
},
{
"name": "CVE-2021-30965",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30965"
},
{
"name": "CVE-2021-30966",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30966"
},
{
"name": "CVE-2021-30982",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30982"
},
{
"name": "CVE-2021-30941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30941"
},
{
"name": "CVE-2021-30985",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30985"
},
{
"name": "CVE-2021-30958",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30958"
},
{
"name": "CVE-2021-30931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30931"
},
{
"name": "CVE-2021-30960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30960"
},
{
"name": "CVE-2021-30968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30968"
},
{
"name": "CVE-2021-30945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30945"
},
{
"name": "CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"name": "CVE-2021-30947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30947"
},
{
"name": "CVE-2021-30932",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30932"
},
{
"name": "CVE-2021-30979",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30979"
},
{
"name": "CVE-2021-30980",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30980"
},
{
"name": "CVE-2021-30973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30973"
},
{
"name": "CVE-2021-30970",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30970"
},
{
"name": "CVE-2021-30996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30996"
},
{
"name": "CVE-2021-30940",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30940"
},
{
"name": "CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"name": "CVE-2021-30977",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30977"
},
{
"name": "CVE-2021-30942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30942"
},
{
"name": "CVE-2021-30990",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30990"
},
{
"name": "CVE-2021-30929",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30929"
},
{
"name": "CVE-2021-30937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30937"
},
{
"name": "CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"name": "CVE-2021-30975",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30975"
},
{
"name": "CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"name": "CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"name": "CVE-2021-30949",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30949"
},
{
"name": "CVE-2021-30926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30926"
},
{
"name": "CVE-2021-30946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30946"
},
{
"name": "CVE-2021-30991",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30991"
},
{
"name": "CVE-2021-30935",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30935"
},
{
"name": "CVE-2021-30938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30938"
},
{
"name": "CVE-2021-30955",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30955"
},
{
"name": "CVE-2021-30927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30927"
},
{
"name": "CVE-2021-30988",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30988"
},
{
"name": "CVE-2021-30959",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30959"
},
{
"name": "CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"name": "CVE-2021-30995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30995"
},
{
"name": "CVE-2021-30961",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30961"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-945",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service et un contournement de\nla politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212979 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212979"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212981 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212981"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212976 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212975 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212978 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212980 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212980"
}
]
}
CERTFR-2021-AVI-956
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Apple Safari. Elles permettent à un attaquant de provoquer une exécution de code arbitraire.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Safari versions ant\u00e9rieures \u00e0 15.2",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"name": "CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"name": "CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"name": "CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"name": "CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"name": "CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"name": "CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-956",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-12-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Apple Safari. Elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple Safari",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT212982 du 13 d\u00e9cembre 2021",
"url": "https://support.apple.com/en-us/HT212982"
}
]
}
alsa-2022:1777
Vulnerability from osv_almalinux
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
The following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)
Security Fix(es):
-
webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)
-
webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)
-
webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)
-
webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)
-
webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)
-
webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)
-
webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)
-
webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)
-
webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)
-
webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)
-
webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)
-
webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)
-
webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)
-
webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)
-
webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)
-
webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)
-
webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)
-
webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)
-
webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)
-
webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)
-
webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "webkit2gtk3-jsc-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.34.6-1.el8"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nThe following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)\n\nSecurity Fix(es):\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the AlmaLinux Release Notes linked from the References section.",
"id": "ALSA-2022:1777",
"modified": "2022-05-10T08:00:31Z",
"published": "2022-05-10T06:24:27Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1777.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30809"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30818"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30823"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30836"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30846"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30848"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30849"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30851"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30884"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30887"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30888"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30889"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30890"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30897"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30934"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30936"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30951"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30952"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30953"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30954"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-30984"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45481"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45482"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2021-45483"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22589"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22590"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22592"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22594"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22620"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-22637"
}
],
"related": [
"CVE-2022-22620",
"CVE-2021-30809",
"CVE-2021-30818",
"CVE-2021-30823",
"CVE-2021-30846",
"CVE-2021-30848",
"CVE-2021-30849",
"CVE-2021-30851",
"CVE-2021-30887",
"CVE-2021-30888",
"CVE-2021-30889",
"CVE-2021-30890",
"CVE-2021-30897",
"CVE-2021-30934",
"CVE-2021-30936",
"CVE-2021-30951",
"CVE-2021-30952",
"CVE-2021-30953",
"CVE-2021-30954",
"CVE-2021-30984",
"CVE-2021-45481",
"CVE-2021-45482",
"CVE-2021-45483",
"CVE-2022-22589",
"CVE-2022-22590",
"CVE-2022-22592",
"CVE-2022-22594",
"CVE-2022-22637",
"CVE-2021-30836",
"CVE-2021-30884"
],
"summary": "Moderate: webkit2gtk3 security, bug fix, and enhancement update"
}
BDU:2022-03117
Vulnerability from fstec - Published: 13.12.2021{
"CVSS 2.0": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, Red Hat Inc., Fedora Project, Apple Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "9 (Debian GNU/Linux), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), 34 (Fedora), 11 (Debian GNU/Linux), 35 (Fedora), \u0434\u043e 8.3 (watchOS), \u0434\u043e 15.2 (iOS), \u0434\u043e 15.2 (iPadOS), \u0434\u043ej Monterey 12.1 (MacOS), \u0434\u043e 15.2 (tvOS), \u0434\u043e 15.2 (Safari), \u0434\u043e 2.34.4 (WebKitGTK), \u0434\u043e 2.34.4 (WPE WebKit), 9 (Red Hat Enterprise Linux)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\n\u0414\u043b\u044f WebKitGTK \u0438 WPE WebKit:\nhttps://webkitgtk.org/security/WSA-2022-0001.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Apple Inc.:\nhttps://support.apple.com/en-us/HT212975 \nhttps://support.apple.com/en-us/HT212976 \nhttps://support.apple.com/en-us/HT212978 \nhttps://support.apple.com/en-us/HT212980 \nhttps://support.apple.com/en-us/HT212982\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2021-30984\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2044553",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "13.12.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "26.05.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "26.05.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-03117",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-30984",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Debian GNU/Linux, Red Hat Enterprise Linux, Fedora, watchOS, iOS, iPadOS, MacOS, tvOS, Safari, WebKitGTK, WPE WebKit",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "\u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Fedora Project Fedora 34 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , Fedora Project Fedora 35 , Apple Inc. watchOS \u0434\u043e 8.3 , Apple Inc. iOS \u0434\u043e 15.2 , Apple Inc. iPadOS \u0434\u043e 15.2 , Apple Inc. MacOS \u0434\u043ej Monterey 12.1 , Apple Inc. tvOS \u0434\u043e 15.2 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKitGTK \u0438 WPE WebKit, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u044f \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446 WebKitGTK \u0438 WPE WebKit \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.cybersecurity-help.cz/vdb/SB2021121510\nhttps://support.apple.com/en-us/HT212975 \nhttps://support.apple.com/en-us/HT212976 \nhttps://support.apple.com/en-us/HT212978 \nhttps://support.apple.com/en-us/HT212980 \nhttps://support.apple.com/en-us/HT212982\nhttps://webkitgtk.org/security/WSA-2022-0001.html\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/\nhttps://security-tracker.debian.org/tracker/CVE-2021-30984\nhttps://bugzilla.redhat.com/show_bug.cgi?id=2044553",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,6)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,5)"
}
FKIE_CVE-2021-30984
Vulnerability from fkie_nvd - Published: 2021-08-24 19:15 - Updated: 2024-11-21 06:05| URL | Tags | ||
|---|---|---|---|
| product-security@apple.com | http://www.openwall.com/lists/oss-security/2022/01/21/2 | ||
| product-security@apple.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ | ||
| product-security@apple.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ | ||
| product-security@apple.com | https://support.apple.com/en-us/HT212975 | ||
| product-security@apple.com | https://support.apple.com/en-us/HT212976 | ||
| product-security@apple.com | https://support.apple.com/en-us/HT212978 | ||
| product-security@apple.com | https://support.apple.com/en-us/HT212980 | ||
| product-security@apple.com | https://support.apple.com/en-us/HT212982 | ||
| product-security@apple.com | https://www.debian.org/security/2022/dsa-5060 | ||
| product-security@apple.com | https://www.debian.org/security/2022/dsa-5061 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/01/21/2 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT212975 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT212976 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT212978 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT212980 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/en-us/HT212982 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5060 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2022/dsa-5061 |
| Vendor | Product | Version | |
|---|---|---|---|
| apple | safari | * | |
| apple | ipados | * | |
| apple | iphone_os | * | |
| apple | macos | * | |
| apple | tvos | * | |
| apple | watchos | * | |
| fedoraproject | fedora | 34 | |
| fedoraproject | fedora | 35 | |
| debian | debian_linux | 10.0 | |
| debian | debian_linux | 11.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B60AA98-68B6-4770-884B-36AE7826E729",
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CCE4E546-A0DD-4E9E-A6B9-C19B04D77466",
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FB904C1-43D1-4583-8729-5D1B1746A54C",
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "88111C46-3A34-4814-B892-71EB5A9B6743",
"versionEndExcluding": "12.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "16CAE2FB-FADC-4BF4-9115-D20D365051BF",
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A7245FB-6FBE-4C09-80F5-18504CA623B3",
"versionEndExcluding": "8.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
},
{
"lang": "es",
"value": "Se solucion\u00f3 una condici\u00f3n de carrera con un manejo de estado mejorado.\u0026#xa0;Este problema se solucion\u00f3 en tvOS versi\u00f3n 15.2, macOS Monterey versi\u00f3n 12.1, Safari versi\u00f3n 15.2, iOS versi\u00f3n 15.2 e iPadOS versi\u00f3n 15.2, watchOS versi\u00f3n 8.3.\u0026#xa0;El procesamiento de contenido web creado con fines maliciosos puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario"
}
],
"id": "CVE-2021-30984",
"lastModified": "2024-11-21T06:05:05.953",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-08-24T19:15:23.543",
"references": [
{
"source": "product-security@apple.com",
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"source": "product-security@apple.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"source": "product-security@apple.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/HT212980"
},
{
"source": "product-security@apple.com",
"url": "https://support.apple.com/en-us/HT212982"
},
{
"source": "product-security@apple.com",
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"source": "product-security@apple.com",
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/en-us/HT212980"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.apple.com/en-us/HT212982"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2022/dsa-5061"
}
],
"sourceIdentifier": "product-security@apple.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2021-30984
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-30984",
"description": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"id": "GSD-2021-30984",
"references": [
"https://www.suse.com/security/cve/CVE-2021-30984.html",
"https://www.debian.org/security/2022/dsa-5060",
"https://www.debian.org/security/2022/dsa-5061",
"https://ubuntu.com/security/CVE-2021-30984",
"https://advisories.mageia.org/CVE-2021-30984.html",
"https://linux.oracle.com/cve/CVE-2021-30984.html",
"https://access.redhat.com/errata/RHSA-2022:1777"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-30984"
],
"details": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"id": "GSD-2021-30984",
"modified": "2023-12-13T01:23:31.744132Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "product-security@apple.com",
"ID": "CVE-2021-30984",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "watchOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "8.3"
}
]
}
},
{
"product_name": "iOS and iPadOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "12.1"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
},
{
"product_name": "macOS",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "15.2"
}
]
}
}
]
},
"vendor_name": "Apple"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Processing maliciously crafted web content may lead to arbitrary code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT212975",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212975"
},
{
"name": "https://support.apple.com/en-us/HT212976",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212976"
},
{
"name": "https://support.apple.com/en-us/HT212978",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212978"
},
{
"name": "https://support.apple.com/en-us/HT212980",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212980"
},
{
"name": "https://support.apple.com/en-us/HT212982",
"refsource": "MISC",
"url": "https://support.apple.com/en-us/HT212982"
},
{
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"name": "FEDORA-2022-25a98f5d55",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"name": "DSA-5061",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"name": "DSA-5060",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"name": "FEDORA-2022-f7366e60cb",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "12.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "15.2",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-30984"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-362"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.apple.com/en-us/HT212975",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT212975"
},
{
"name": "https://support.apple.com/en-us/HT212978",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT212978"
},
{
"name": "https://support.apple.com/en-us/HT212976",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT212976"
},
{
"name": "https://support.apple.com/en-us/HT212982",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT212982"
},
{
"name": "https://support.apple.com/en-us/HT212980",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://support.apple.com/en-us/HT212980"
},
{
"name": "[oss-security] 20220121 WebKitGTK and WPE WebKit Security Advisory WSA-2022-0001",
"refsource": "MLIST",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2022/01/21/2"
},
{
"name": "FEDORA-2022-25a98f5d55",
"refsource": "FEDORA",
"tags": [
"Issue Tracking",
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7EQVZ3CEMTINLBZ7PBC7WRXVEVCRHNSM/"
},
{
"name": "DSA-5061",
"refsource": "DEBIAN",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5061"
},
{
"name": "DSA-5060",
"refsource": "DEBIAN",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2022/dsa-5060"
},
{
"name": "FEDORA-2022-f7366e60cb",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HQKWD4BXRDD2YGR5AVU7H5J5PIQIEU6V/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-02-19T04:34Z",
"publishedDate": "2021-08-24T19:15Z"
}
}
}
OPENSUSE-SU-2022:0705-1
Vulnerability from csaf_opensuse - Published: 2022-03-04 06:45 - Updated: 2022-03-04 06:45| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://lists.opensuse.org/archives/list/security… | self |
| https://bugzilla.suse.com/1195064 | self |
| https://bugzilla.suse.com/1195735 | self |
| https://bugzilla.suse.com/1196133 | self |
| https://www.suse.com/security/cve/CVE-2021-30934/ | self |
| https://www.suse.com/security/cve/CVE-2021-30936/ | self |
| https://www.suse.com/security/cve/CVE-2021-30951/ | self |
| https://www.suse.com/security/cve/CVE-2021-30952/ | self |
| https://www.suse.com/security/cve/CVE-2021-30953/ | self |
| https://www.suse.com/security/cve/CVE-2021-30954/ | self |
| https://www.suse.com/security/cve/CVE-2021-30984/ | self |
| https://www.suse.com/security/cve/CVE-2021-45481/ | self |
| https://www.suse.com/security/cve/CVE-2021-45482/ | self |
| https://www.suse.com/security/cve/CVE-2021-45483/ | self |
| https://www.suse.com/security/cve/CVE-2022-22589/ | self |
| https://www.suse.com/security/cve/CVE-2022-22590/ | self |
| https://www.suse.com/security/cve/CVE-2022-22592/ | self |
| https://www.suse.com/security/cve/CVE-2022-22620/ | self |
| https://www.suse.com/security/cve/CVE-2021-30934 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://bugzilla.suse.com/1196393 | external |
| https://www.suse.com/security/cve/CVE-2021-30936 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30951 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30952 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30953 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30954 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-30984 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45481 | external |
| https://bugzilla.suse.com/1194138 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45482 | external |
| https://bugzilla.suse.com/1194136 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2021-45483 | external |
| https://bugzilla.suse.com/1194135 | external |
| https://bugzilla.suse.com/1195064 | external |
| https://www.suse.com/security/cve/CVE-2022-22589 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22590 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22592 | external |
| https://bugzilla.suse.com/1195735 | external |
| https://www.suse.com/security/cve/CVE-2022-22620 | external |
| https://bugzilla.suse.com/1196133 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for webkit2gtk3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for webkit2gtk3 fixes the following issues:\n\nUpdate to version 2.34.6 (bsc#1196133):\n\n- CVE-2022-22620: Processing maliciously crafted web content may have lead to arbitrary code execution.\n\nUpdate to version 2.34.5 (bsc#1195735):\n\n- CVE-2022-22589: A validation issue was addressed with improved input sanitization.\n- CVE-2022-22590: A use after free issue was addressed with improved memory management.\n- CVE-2022-22592: A logic issue was addressed with improved state management.\n\nUpdate to version 2.34.4 (bsc#1195064):\n\n- CVE-2021-30934: A buffer overflow issue was addressed with improved memory handling.\n- CVE-2021-30936: A use after free issue was addressed with improved memory management.\n- CVE-2021-30951: A use after free issue was addressed with improved memory management.\n- CVE-2021-30952: An integer overflow was addressed with improved input validation.\n- CVE-2021-30953: An out-of-bounds read was addressed with improved bounds checking.\n- CVE-2021-30954: A type confusion issue was addressed with improved memory handling.\n- CVE-2021-30984: A race condition was addressed with improved state handling.\n- CVE-2022-22594: A cross-origin issue in the IndexDB API was addressed with improved input validation.\n\nThe following CVEs were addressed in a previous update:\n\n- CVE-2021-45481: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create.\n- CVE-2021-45482: A use-after-free in WebCore::ContainerNode::firstChild.\n- CVE-2021-45483: A use-after-free in WebCore::Frame::page.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2022-705,openSUSE-SLE-15.4-2022-705",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0705-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0705-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0705-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N4Z4NVNJOFDH7QHR6XKK6NVIFOWPKI3Y/"
},
{
"category": "self",
"summary": "SUSE Bug 1195064",
"url": "https://bugzilla.suse.com/1195064"
},
{
"category": "self",
"summary": "SUSE Bug 1195735",
"url": "https://bugzilla.suse.com/1195735"
},
{
"category": "self",
"summary": "SUSE Bug 1196133",
"url": "https://bugzilla.suse.com/1196133"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30934 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30934/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30936 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30936/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30951 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30951/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30952 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30952/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30953 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30954 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30984 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45481 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45481/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45482 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45482/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-45483 page",
"url": "https://www.suse.com/security/cve/CVE-2021-45483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22589 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22589/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22590 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22592 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-22620 page",
"url": "https://www.suse.com/security/cve/CVE-2022-22620/"
}
],
"title": "Security update for webkit2gtk3",
"tracking": {
"current_release_date": "2022-03-04T06:45:18Z",
"generator": {
"date": "2022-03-04T06:45:18Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0705-1",
"initial_release_date": "2022-03-04T06:45:18Z",
"revision_history": [
{
"date": "2022-03-04T06:45:18Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.aarch64",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.aarch64",
"product_id": "webkit-jsc-4-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.aarch64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"product": {
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"product_id": "libwebkit2gtk3-lang-2.34.6-29.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"product_id": "webkit-jsc-4-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.ppc64le"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.s390x",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.s390x",
"product_id": "webkit-jsc-4-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.s390x"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"product": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"product_id": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"product_id": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"product": {
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"product_id": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"product": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"product_id": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit-jsc-4-2.34.6-29.1.x86_64",
"product": {
"name": "webkit-jsc-4-2.34.6-29.1.x86_64",
"product_id": "webkit-jsc-4-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk3-devel-2.34.6-29.1.x86_64"
}
},
{
"category": "product_version",
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"product": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"product_id": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64"
},
"product_reference": "libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64"
},
"product_reference": "libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libwebkit2gtk3-lang-2.34.6-29.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch"
},
"product_reference": "libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64"
},
"product_reference": "typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit-jsc-4-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64"
},
"product_reference": "webkit-jsc-4-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk3-devel-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
},
"product_reference": "webkit2gtk3-minibrowser-2.34.6-29.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30934",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30934"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30934",
"url": "https://www.suse.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30934",
"url": "https://bugzilla.suse.com/1195064"
},
{
"category": "external",
"summary": "SUSE Bug 1196393 for CVE-2021-30934",
"url": "https://bugzilla.suse.com/1196393"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30934"
},
{
"cve": "CVE-2021-30936",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30936"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30936",
"url": "https://www.suse.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30936",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30936"
},
{
"cve": "CVE-2021-30951",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30951"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30951",
"url": "https://www.suse.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30951",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30951"
},
{
"cve": "CVE-2021-30952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30952"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow was addressed with improved input validation. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30952",
"url": "https://www.suse.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30952",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30952"
},
{
"cve": "CVE-2021-30953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30953"
}
],
"notes": [
{
"category": "general",
"text": "An out-of-bounds read was addressed with improved bounds checking. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30953",
"url": "https://www.suse.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30953",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30953"
},
{
"cve": "CVE-2021-30954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30954"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion issue was addressed with improved memory handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30954",
"url": "https://www.suse.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30954",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30954"
},
{
"cve": "CVE-2021-30984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30984"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was addressed with improved state handling. This issue is fixed in tvOS 15.2, macOS Monterey 12.1, Safari 15.2, iOS 15.2 and iPadOS 15.2, watchOS 8.3. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30984",
"url": "https://www.suse.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-30984",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2021-30984"
},
{
"cve": "CVE-2021-45481",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45481"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create, leading to a segmentation violation and application crash, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45481",
"url": "https://www.suse.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "SUSE Bug 1194138 for CVE-2021-45481",
"url": "https://bugzilla.suse.com/1194138"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45481",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45481"
},
{
"cve": "CVE-2021-45482",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45482"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::ContainerNode::firstChild, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45482",
"url": "https://www.suse.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "SUSE Bug 1194136 for CVE-2021-45482",
"url": "https://bugzilla.suse.com/1194136"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45482",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45482"
},
{
"cve": "CVE-2021-45483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-45483"
}
],
"notes": [
{
"category": "general",
"text": "In WebKitGTK before 2.32.4, there is a use-after-free in WebCore::Frame::page, a different vulnerability than CVE-2021-30889.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-45483",
"url": "https://www.suse.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "SUSE Bug 1194135 for CVE-2021-45483",
"url": "https://bugzilla.suse.com/1194135"
},
{
"category": "external",
"summary": "SUSE Bug 1195064 for CVE-2021-45483",
"url": "https://bugzilla.suse.com/1195064"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "moderate"
}
],
"title": "CVE-2021-45483"
},
{
"cve": "CVE-2022-22589",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22589"
}
],
"notes": [
{
"category": "general",
"text": "A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22589",
"url": "https://www.suse.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22589",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22589"
},
{
"cve": "CVE-2022-22590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22590"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22590",
"url": "https://www.suse.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22590",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22590"
},
{
"cve": "CVE-2022-22592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22592"
}
],
"notes": [
{
"category": "general",
"text": "A logic issue was addressed with improved state management. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing maliciously crafted web content may prevent Content Security Policy from being enforced.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22592",
"url": "https://www.suse.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "SUSE Bug 1195735 for CVE-2022-22592",
"url": "https://bugzilla.suse.com/1195735"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22592"
},
{
"cve": "CVE-2022-22620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-22620"
}
],
"notes": [
{
"category": "general",
"text": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.2.1, iOS 15.3.1 and iPadOS 15.3.1, Safari 15.3 (v. 16612.4.9.1.8 and 15612.4.9.1.8). Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited..",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-22620",
"url": "https://www.suse.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "SUSE Bug 1196133 for CVE-2022-22620",
"url": "https://bugzilla.suse.com/1196133"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libjavascriptcoregtk-4_0-18-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk-4_0-37-32bit-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:libwebkit2gtk3-lang-2.34.6-29.1.noarch",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-JavaScriptCore-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:typelib-1_0-WebKit2WebExtension-4_0-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit-jsc-4-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk-4_0-injected-bundles-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-devel-2.34.6-29.1.x86_64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.aarch64",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.ppc64le",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.s390x",
"openSUSE Leap 15.3:webkit2gtk3-minibrowser-2.34.6-29.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-03-04T06:45:18Z",
"details": "important"
}
],
"title": "CVE-2022-22620"
}
]
}
RHSA-2022:1777
Vulnerability from csaf_redhat - Published: 2022-05-10 13:27 - Updated: 2026-03-06 03:17A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user's browsing history.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 | — |
Vendor Fix
fix
|
| URL | Category |
|---|---|
| https://access.redhat.com/errata/RHSA-2022:1777 | self |
| https://access.redhat.com/security/updates/classi… | external |
| https://access.redhat.com/documentation/en-us/red… | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=1985042 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2041559 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://security.access.redhat.com/data/csaf/v2/a… | self |
| https://access.redhat.com/security/cve/CVE-2021-30809 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034347 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30809 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30809 | external |
| https://access.redhat.com/security/cve/CVE-2021-30818 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034368 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30818 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30818 | external |
| https://access.redhat.com/security/cve/CVE-2021-30823 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034373 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30823 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30823 | external |
| https://access.redhat.com/security/cve/CVE-2021-30836 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034376 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30836 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30836 | external |
| https://access.redhat.com/security/cve/CVE-2021-30846 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017898 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30846 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30846 | external |
| https://webkitgtk.org/security/WSA-2021-0006.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30848 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017901 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30848 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30848 | external |
| https://access.redhat.com/security/cve/CVE-2021-30849 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2017904 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30849 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30849 | external |
| https://access.redhat.com/security/cve/CVE-2021-30851 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2018573 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30851 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30851 | external |
| https://access.redhat.com/security/cve/CVE-2021-30884 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034378 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30884 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30884 | external |
| https://access.redhat.com/security/cve/CVE-2021-30887 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034381 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30887 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30887 | external |
| https://access.redhat.com/security/cve/CVE-2021-30888 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034383 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30888 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30888 | external |
| https://access.redhat.com/security/cve/CVE-2021-30889 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034386 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30889 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30889 | external |
| https://access.redhat.com/security/cve/CVE-2021-30890 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2034389 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30890 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30890 | external |
| https://access.redhat.com/security/cve/CVE-2021-30897 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2038907 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30897 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30897 | external |
| https://access.redhat.com/security/cve/CVE-2021-30934 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044521 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30934 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30934 | external |
| https://access.redhat.com/security/cve/CVE-2021-30936 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044528 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30936 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30936 | external |
| https://webkitgtk.org/security/WSA-2022-0001.html | external |
| https://access.redhat.com/security/cve/CVE-2021-30951 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044534 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30951 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30951 | external |
| https://access.redhat.com/security/cve/CVE-2021-30952 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044538 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30952 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30952 | external |
| https://www.cisa.gov/known-exploited-vulnerabilit… | external |
| https://access.redhat.com/security/cve/CVE-2021-30953 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044542 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30953 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30953 | external |
| https://access.redhat.com/security/cve/CVE-2021-30954 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044551 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30954 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30954 | external |
| https://access.redhat.com/security/cve/CVE-2021-30984 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2044553 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-30984 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-30984 | external |
| https://access.redhat.com/security/cve/CVE-2021-45481 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040327 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45481 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45481 | external |
| https://access.redhat.com/security/cve/CVE-2021-45482 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040329 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45482 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45482 | external |
| https://access.redhat.com/security/cve/CVE-2021-45483 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2040331 | external |
| https://www.cve.org/CVERecord?id=CVE-2021-45483 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2021-45483 | external |
| https://access.redhat.com/security/cve/CVE-2022-22589 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053179 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22589 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22589 | external |
| https://webkitgtk.org/security/WSA-2022-0002.html | external |
| https://access.redhat.com/security/cve/CVE-2022-22590 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053181 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22590 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22590 | external |
| https://access.redhat.com/security/cve/CVE-2022-22592 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2053185 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22592 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22592 | external |
| https://access.redhat.com/security/cve/CVE-2022-22594 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2045291 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22594 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22594 | external |
| https://access.redhat.com/security/cve/CVE-2022-22620 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2056474 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22620 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22620 | external |
| https://webkitgtk.org/security/WSA-2022-0003.html | external |
| https://access.redhat.com/security/cve/CVE-2022-22637 | self |
| https://bugzilla.redhat.com/show_bug.cgi?id=2073903 | external |
| https://www.cve.org/CVERecord?id=CVE-2022-22637 | external |
| https://nvd.nist.gov/vuln/detail/CVE-2022-22637 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nThe following packages have been upgraded to a later upstream version: webkit2gtk3 (2.34.6). (BZ#1985042)\n\nSecurity Fix(es):\n\n* webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free (CVE-2022-22620)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2021-30809)\n\n* webkitgtk: Type confusion issue leading to arbitrary code execution (CVE-2021-30818)\n\n* webkitgtk: Logic issue leading to HSTS bypass (CVE-2021-30823)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30846)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30848)\n\n* webkitgtk: Multiple memory corruption issue leading to arbitrary code execution (CVE-2021-30849)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2021-30851)\n\n* webkitgtk: Logic issue leading to Content Security Policy bypass (CVE-2021-30887)\n\n* webkitgtk: Information leak via Content Security Policy reports (CVE-2021-30888)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2021-30889)\n\n* webkitgtk: Logic issue leading to universal cross-site scripting (CVE-2021-30890)\n\n* webkitgtk: Cross-origin data exfiltration via resource timing API (CVE-2021-30897)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30934)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30936)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30951)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30952)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30953)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30954)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2021-30984)\n\n* webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create (CVE-2021-45481)\n\n* webkitgtk: use-after-free in WebCore::ContainerNode::firstChild (CVE-2021-45482)\n\n* webkitgtk: use-after-free in WebCore::Frame::page (CVE-2021-45483)\n\n* webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript (CVE-2022-22589)\n\n* webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution (CVE-2022-22590)\n\n* webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced (CVE-2022-22592)\n\n* webkitgtk: A malicious website may exfiltrate data cross-origin (CVE-2022-22594)\n\n* webkitgtk: logic issue was addressed with improved state management (CVE-2022-22637)\n\n* webkitgtk: Out-of-bounds read leading to memory disclosure (CVE-2021-30836)\n\n* webkitgtk: CSS compositing issue leading to revealing of the browsing history (CVE-2021-30884)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.6 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2022:1777",
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/"
},
{
"category": "external",
"summary": "1985042",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1985042"
},
{
"category": "external",
"summary": "2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "2041559",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2041559"
},
{
"category": "external",
"summary": "2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_1777.json"
}
],
"title": "Red Hat Security Advisory: webkit2gtk3 security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2026-03-06T03:17:14+00:00",
"generator": {
"date": "2026-03-06T03:17:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.7.2"
}
},
"id": "RHSA-2022:1777",
"initial_release_date": "2022-05-10T13:27:07+00:00",
"revision_history": [
{
"date": "2022-05-10T13:27:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2022-05-10T13:27:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-03-06T03:17:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.34.6-1.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.src",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"relates_to_product_reference": "AppStream-8.6.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
},
"product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30809",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034347"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Use-after-free leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30809"
},
{
"category": "external",
"summary": "RHBZ#2034347",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034347"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30809"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30809"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Use-after-free leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30818",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034368"
}
],
"notes": [
{
"category": "description",
"text": "A confusion type flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Type confusion issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30818"
},
{
"category": "external",
"summary": "RHBZ#2034368",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034368"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30818",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30818"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30818"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Type confusion issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30823",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034373"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. An attacker in a privileged network position could use this flaw to bypass HSTS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to HSTS bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30823"
},
{
"category": "external",
"summary": "RHBZ#2034373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30823"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30823"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to HSTS bypass"
},
{
"cve": "CVE-2021-30836",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034376"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in WebKitGTK. A specially crafted audio file could use this flaw to trigger a disclosure of memory when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Out-of-bounds read leading to memory disclosure",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30836"
},
{
"category": "external",
"summary": "RHBZ#2034376",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034376"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30836",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30836"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30836"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: Out-of-bounds read leading to memory disclosure"
},
{
"cve": "CVE-2021-30846",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017898"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, watchOS 8. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30846"
},
{
"category": "external",
"summary": "RHBZ#2017898",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017898"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30846",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30846"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30846"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30848",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017901"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption issue was addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, Safari 15, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30848"
},
{
"category": "external",
"summary": "RHBZ#2017901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30848"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30848"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30849",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2017904"
}
],
"notes": [
{
"category": "description",
"text": "Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 14.8 and iPadOS 14.8, watchOS 8, Safari 15, tvOS 15, iOS 15 and iPadOS 15, iTunes 12.12 for Windows. Processing maliciously crafted web content may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30849"
},
{
"category": "external",
"summary": "RHBZ#2017904",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2017904"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30849",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30849"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30849"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Multiple memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30851",
"discovery_date": "2021-10-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2018573"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption vulnerability was addressed with improved locking. This issue is fixed in Safari 15, tvOS 15, watchOS 8, iOS 15 and iPadOS 15. Processing maliciously crafted web content may lead to code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Memory corruption issue leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30851"
},
{
"category": "external",
"summary": "RHBZ#2018573",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2018573"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30851",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30851"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2021-0006.html",
"url": "https://webkitgtk.org/security/WSA-2021-0006.html"
}
],
"release_date": "2021-10-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Memory corruption issue leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30884",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034378"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way WebKitGTK performed CSS compositing. A malicious web site could possibly use this flaw to reveal user\u0027s browsing history.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: CSS compositing issue leading to revealing of the browsing history",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30884"
},
{
"category": "external",
"summary": "RHBZ#2034378",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034378"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30884",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30884"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30884"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "webkitgtk: CSS compositing issue leading to revealing of the browsing history"
},
{
"cve": "CVE-2021-30887",
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034381"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. A specially crafted web content could use this flaw to bypass Content Security Policy bypass when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to Content Security Policy bypass",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30887"
},
{
"category": "external",
"summary": "RHBZ#2034381",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034381"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30887",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30887"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30887"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to Content Security Policy bypass"
},
{
"cve": "CVE-2021-30888",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034383"
}
],
"notes": [
{
"category": "description",
"text": "An information leak flaw was found in WebKitGTK. A malicious web site using Content Security Policy reports could use this flaw to leak information via redirects.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Information leak via Content Security Policy reports",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30888"
},
{
"category": "external",
"summary": "RHBZ#2034383",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034383"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30888",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30888"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30888"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Information leak via Content Security Policy reports"
},
{
"cve": "CVE-2021-30889",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034386"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow flaw was found in WebKitGTK. Specially crafted web content could use this flaw to trigger an arbitrary code execution when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Buffer overflow leading to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30889"
},
{
"category": "external",
"summary": "RHBZ#2034386",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034386"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30889",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30889"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30889"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Buffer overflow leading to arbitrary code execution"
},
{
"cve": "CVE-2021-30890",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2034389"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK. Specially crafted web content could use this flaw to trigger a universal cross-site scripting when processed.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Logic issue leading to universal cross-site scripting",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30890"
},
{
"category": "external",
"summary": "RHBZ#2034389",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2034389"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30890",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30890"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30890"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Logic issue leading to universal cross-site scripting"
},
{
"cve": "CVE-2021-30897",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"discovery_date": "2021-12-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2038907"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the resource timing API specification and its implementation in WebKitGTK. A malicious web site could use this flaw to trigger a cross-domain data exfiltration.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Cross-origin data exfiltration via resource timing API",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30897"
},
{
"category": "external",
"summary": "RHBZ#2038907",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2038907"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30897"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30897"
}
],
"release_date": "2021-12-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Cross-origin data exfiltration via resource timing API"
},
{
"cve": "CVE-2021-30934",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044521"
}
],
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability was found in webkitgtk. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash or lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30934"
},
{
"category": "external",
"summary": "RHBZ#2044521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30934",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30934"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30934"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30936",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044528"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30936"
},
{
"category": "external",
"summary": "RHBZ#2044528",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044528"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30936",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30936"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30936"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30951",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044534"
}
],
"notes": [
{
"category": "description",
"text": "A use after free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30951"
},
{
"category": "external",
"summary": "RHBZ#2044534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30951",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30951"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30951"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30952",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, which can lead to an integer overflow. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30952"
},
{
"category": "external",
"summary": "RHBZ#2044538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30952",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30952"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30952"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2026-03-05T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30953",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044542"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper bounds checking, which can lead to an out-of-bounds read vulnerability. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30953"
},
{
"category": "external",
"summary": "RHBZ#2044542",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044542"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30953",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30953"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30953"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30954",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044551"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper memory handling, which can lead to a type confusion issue. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30954"
},
{
"category": "external",
"summary": "RHBZ#2044551",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044551"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30954",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30954"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30954"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-30984",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2044553"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper state handling, which can lead to a race condition. An attacker with network access could pass specially crafted web content files causing an application to halt, crash, or may lead to arbitrary code execution.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-30984"
},
{
"category": "external",
"summary": "RHBZ#2044553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2044553"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-30984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30984"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-30984"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2021-45481",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040327"
}
],
"notes": [
{
"category": "description",
"text": "A segmentation violation vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45481"
},
{
"category": "external",
"summary": "RHBZ#2040327",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040327"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45481"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45481"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Incorrect memory allocation in WebCore::ImageBufferCairoImageSurfaceBackend::create"
},
{
"cve": "CVE-2021-45482",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040329"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45482"
},
{
"category": "external",
"summary": "RHBZ#2040329",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040329"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45482",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45482"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45482"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::ContainerNode::firstChild"
},
{
"cve": "CVE-2021-45483",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2021-12-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2040331"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in webkitgtk. An attacker with network access could pass specially crafted HTML files causing an application to halt or crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: use-after-free in WebCore::Frame::page",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-45483"
},
{
"category": "external",
"summary": "RHBZ#2040331",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2040331"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-45483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45483"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-45483"
}
],
"release_date": "2021-12-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: use-after-free in WebCore::Frame::page"
},
{
"cve": "CVE-2022-22589",
"cwe": {
"id": "CWE-1173",
"name": "Improper Use of Validation Framework"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053179"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The vulnerability exists due to improper input validation in WebKit when processing email messages. This flaw allows a remote attacker to trick the victim into opening a specially crafted email message and execute arbitrary JavaScript code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22589"
},
{
"category": "external",
"summary": "RHBZ#2053179",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053179"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22589"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22589"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing a maliciously crafted mail message may lead to running arbitrary javascript"
},
{
"cve": "CVE-2022-22590",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053181"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, trigger a use-after-free error and execute arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22590"
},
{
"category": "external",
"summary": "RHBZ#2053181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053181"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22590"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22590"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution"
},
{
"cve": "CVE-2022-22592",
"cwe": {
"id": "CWE-1021",
"name": "Improper Restriction of Rendered UI Layers or Frames"
},
"discovery_date": "2022-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2053185"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in WebKitGTK. The flaw exists due to a logic issue when processing HTML content in WebKit. This flaw allows a remote attacker to create a specially crafted web page, trick the victim into visiting it, and prevent the Content Security Policy from being enforced, allowing the remote attacker to bypass implemented security restrictions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nRed Hat Product Security has rated this issue as having a Moderate security impact, and the issue is not currently planned to be addressed in future updates for Red Hat Enterprise Linux 6 and 7, hence, marked as Out-of-Support-Scope. \n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22592"
},
{
"category": "external",
"summary": "RHBZ#2053185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2053185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22592"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22592"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0002.html",
"url": "https://webkitgtk.org/security/WSA-2022-0002.html"
}
],
"release_date": "2022-02-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: Processing maliciously crafted web content may prevent Content Security Policy from being enforced"
},
{
"cve": "CVE-2022-22594",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"discovery_date": "2022-01-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2045291"
}
],
"notes": [
{
"category": "description",
"text": "A cross-origin issue in the IndexDB API was addressed with improved input validation. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. A website may be able to track sensitive user information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: A malicious website may exfiltrate data cross-origin",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22594"
},
{
"category": "external",
"summary": "RHBZ#2045291",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2045291"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22594"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22594"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0001.html",
"url": "https://webkitgtk.org/security/WSA-2022-0001.html"
}
],
"release_date": "2022-01-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: A malicious website may exfiltrate data cross-origin"
},
{
"cve": "CVE-2022-22620",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-02-21T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2056474"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in WebKitGTK. The vulnerability occurs when processing HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a use-after-free error and leading to the execution of arbitrary code on the system.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22620"
},
{
"category": "external",
"summary": "RHBZ#2056474",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2056474"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22620"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22620"
},
{
"category": "external",
"summary": "https://webkitgtk.org/security/WSA-2022-0003.html",
"url": "https://webkitgtk.org/security/WSA-2022-0003.html"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2022-02-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-02-11T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: maliciously crafted web content may lead to arbitrary code execution due to use after free"
},
{
"cve": "CVE-2022-22637",
"discovery_date": "2022-04-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2073903"
}
],
"notes": [
{
"category": "description",
"text": "A logic issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process unexpected cross-origin attacks.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "webkitgtk: logic issue was addressed with improved state management",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-22637"
},
{
"category": "external",
"summary": "RHBZ#2073903",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073903"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-22637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22637"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22637"
}
],
"release_date": "2022-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2022-05-10T13:27:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2022:1777"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.src",
"AppStream-8.6.0.GA:webkit2gtk3-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-debugsource-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-devel-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-debuginfo-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-0:2.34.6-1.el8.x86_64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.aarch64",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.i686",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.ppc64le",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.s390x",
"AppStream-8.6.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.34.6-1.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "webkitgtk: logic issue was addressed with improved state management"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.